EP2544400A2 - PUF based Cryptographic communication system and cryptographic communication method - Google Patents
PUF based Cryptographic communication system and cryptographic communication method Download PDFInfo
- Publication number
- EP2544400A2 EP2544400A2 EP12171635A EP12171635A EP2544400A2 EP 2544400 A2 EP2544400 A2 EP 2544400A2 EP 12171635 A EP12171635 A EP 12171635A EP 12171635 A EP12171635 A EP 12171635A EP 2544400 A2 EP2544400 A2 EP 2544400A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- semiconductor device
- unique code
- common key
- correction data
- generation unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 311
- 238000000034 method Methods 0.000 title claims description 86
- 239000004065 semiconductor Substances 0.000 claims abstract description 1046
- 238000012937 correction Methods 0.000 claims abstract description 484
- 238000012795 verification Methods 0.000 claims description 86
- 230000008569 process Effects 0.000 claims description 39
- 230000000873 masking effect Effects 0.000 claims description 13
- 238000003860 storage Methods 0.000 description 131
- 230000006870 function Effects 0.000 description 32
- 238000010586 diagram Methods 0.000 description 29
- 230000005540 biological transmission Effects 0.000 description 17
- 238000003780 insertion Methods 0.000 description 8
- 230000037431 insertion Effects 0.000 description 8
- 238000004519 manufacturing process Methods 0.000 description 8
- 230000015556 catabolic process Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 239000000446 fuel Substances 0.000 description 2
- 238000010884 ion-beam technique Methods 0.000 description 2
- 230000000704 physical effect Effects 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 230000004044 response Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Definitions
- the present invention relates to a cryptographic communication system and a cryptographic communication method and, particularly, to a cryptographic communication system and a cryptographic communication method that enhance security.
- communication data is encrypted to prevent wiretapping, falsification and the like of the communication data.
- One of techniques for the encryption is common key cryptosystem in which both ends of communication use a common encryption key (which is referred to hereinafter as a common key). In the common key cryptosystem, it is necessary for both ends of communication to share the common key without a third party knowing.
- One of techniques to achieve that is public key cryptosystem using RSA (registered trademark), elliptic curve cryptography and the like.
- a technique to provide an integrated circuit that can prevent use of an illegally copied IC is disclosed in Japanese Unexamined Patent Application Publication No 2010-226603 .
- a technique to generate a security word such as RSA public key or secret key using a circuit for generating unique data that is physically uncopyable or another element to thereby ensure security of an integrated circuit used in electronic equipment is disclosed in Japanese Unexamined Patent Application Publication (Translation of PCT Application) No. 2010-52721 9.
- a technique to reduce time for key exchange in a communication system to perform cryptographic communication using a common encryption key through a local area network is disclosed in Japanese Unexamined Patent Application Publication No. 2005-341528 .
- a technique to easily verify completeness of data in data transmission/reception by ad-hoc wireless connection is disclosed in Japanese Unexamined Patent Application Publication No. 2002-26899 .
- the common key CK(x) needs to be shared between ICx and ICy.
- ICx has the common key CK(x)
- ICx encrypts the common key CK(x) using a public key PK(y) of ICy acquired in advance and transmits the encrypted common key CK(x) ⁇ to ICy.
- ICy decrypts the encrypted common key CK(x)' using a secret key SK(y) of ICy and thereby acquires the common key CK(x).
- a cryptographic communication system includes a first semiconductor device and a second semiconductor device.
- the first semiconductor device generates a common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and first correction data for correcting the first unique code, encrypts the common key by using a public key, and transmits the encrypted common key to the second semiconductor device.
- the second semiconductor device generates a secret key of the second semiconductor device by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor device and second correction data for correcting the second unique code, and decrypts the encrypted common key transmitted from the first semiconductor device by using the secret key.
- a cryptographic communication system includes a first semiconductor device and a second semiconductor device.
- the first semiconductor device generates a secret key of the first semiconductor device by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and first correction data for correcting the first unique code, generates signature data by using the secret key and a plain text, and transmits the signature data to the second semiconductor device.
- the second semiconductor device generates verification data by using the transmitted signature data and a public key of the first semiconductor device and compares the verification data with the plain text to determine whether the first semiconductor device has a secret key. By this operation, the first semiconductor device does not need to directly store the secret key, which is important data, thereby improving security for digital signature between the first semiconductor device and the second semiconductor device.
- the public key of the first semiconductor device may be generated using a second unique code that is a unique code arising from process variation or the like of the second semiconductor device and second correction data for correcting the second unique code.
- a cryptographic communication system includes first to third semiconductor devices.
- the third semiconductor device supplies first correction data for correcting a first unique code to the first semiconductor device, and the first semiconductor device generates a common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and the first correction data supplied from the third semiconductor device.
- the third semiconductor device supplies second correction data for correcting a second unique code to the second semiconductor device, and the second semiconductor device generates a common key by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor device and the second correction data supplied from the third semiconductor device.
- the third semiconductor device may include a database that stores correction data associated with respective semiconductor devices and commons keys generated in the respective semiconductor device.
- the third semiconductor device may generate the first correction data by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and a common key, and generate the second correction data by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor and the common key.
- the third semiconductor device may generate the first correction data by using a first unique code first unique code that is a unique code arising from process variation or the like of the first semiconductor device and a first common key, and generate the second correction data by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor and a second common key.
- the first semiconductor device may have the first common key
- the second semiconductor device may have the second common key
- the third semiconductor device may have the first and second common keys.
- the first semiconductor device and the third semiconductor device can communicate using the first common key
- the second semiconductor device and the third semiconductor device can communicate using the second common key
- the first semiconductor device and the second semiconductor device can communicate through the third semiconductor device.
- a cryptographic communication system includes a first semiconductor device and a second semiconductor device.
- the first semiconductor device generates a first common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and first correction data for correcting the first unique code. Further, the first semiconductor device generates second correction data for correcting a second unique code by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor and the first common key, and transmits the generated second correction data to the second semiconductor device.
- the second semiconductor device generates a first common key by using the second correction data generated in the first semiconductor device and the second unique code. By this operation, the first semiconductor device and the second semiconductor device have the same common key. Thus, the first semiconductor device and the second semiconductor device can perform highly secure communication using the first common key.
- the second semiconductor device may encrypt the second unique code by using a public key of the first semiconductor device and transmit the encrypted second unique code to the first semiconductor device, and the first semiconductor device may decrypt the encrypted second unique code by using a secret key of the first semiconductor device.
- a cryptographic communication system may include a server including a database that stores public keys of respective semiconductor devices in association with the respective semiconductor devices.
- the second semiconductor device then generates signature data by using a secret key of the second semiconductor device and a plain text, and transmits the signature data to the first semiconductor device.
- the first semiconductor device generates verification data by using a public key of the second semiconductor device transmitted from the server and the signature data transmitted from the second semiconductor device and compares the verification data with the plain text to determine whether the second semiconductor device has a secret key.
- the second semiconductor device may encrypt a correction data generation program for generating second correction data using the first common key and the second unique code by using the public key of the first semiconductor device and transmit the encrypted correction data generation program to the first semiconductor device.
- the first semiconductor device decrypts the encrypted correction data generation program and executes the decrypted correction data generation program and thereby generates the second correction data by using the first common key and the second unique code.
- the first common key generation unit may generate a second common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and third correction data for correcting the first unique code.
- the first semiconductor device can thereby communicate with the second semiconductor device using the first common key and communicate with the third semiconductor device using the second common key, and the second semiconductor device can communicate with the third semiconductor device through the first semiconductor device.
- a cryptographic communication system may be applied to a vehicle-mounted semiconductor device.
- a cryptographic communication system and a cryptographic communication method that enhance security. Further, according to the aspects of the present invention, it is possible to provide a cryptographic communication system and a cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- Fig. 1 is a block diagram showing a cryptographic communication system according to a first embodiment.
- the cryptographic communication system 1 includes a semiconductor device ICa (first semiconductor device) 10 and a semiconductor device ICb (second semiconductor device) 20.
- the semiconductor device 10 includes a unique code generation unit 11, a storage unit 12, a common key generation unit 13, and an encryption unit 14.
- the unique code generation unit 11 generates a unique code (first unique code) UC(a) having a value unique to the semiconductor device 10 and containing a random error and outputs it to the common key generation unit 13.
- the unique code UC(a) is a value determined by physical properties inherent to an element included in the semiconductor device 10. For example, the unique code generation unit 11 may generate the unique code UC(a) using a value at startup of a memory element included in the semiconductor device 10.
- the unique code is a code generated using the property that actually fabricated ICs vary despite that the design of the ICs is the same.
- PUF Physical Unclonable Function
- the storage unit 12 can store correction data (first correction data) CD(a), a common key CK(a) generated in the common key generation unit 13, and a public key PK(b) of the semiconductor device 20.
- the storage unit 12 includes a volatile memory (for example, SRAM) and a nonvolatile memory (for example, flash memory), for example, and the correction data CD(a) and the public key PK(b) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 12 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 10 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 10 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 13 generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 11 and the correction data CD(a) stored in the storage unit 12.
- the unique code UC(a) generated in the unique code generation unit 11 is data containing bit values that vary depending on external factors during generation of the unique code, such as temperature and voltage, for example. Therefore, the unique code UC(a) generated in the unique code generation unit 11 contains three types of bits: (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). In this manner, the unique code UC(a) generated in the unique code generation unit 11 contains (2) bits with high variability and (3) bits with low variability. Accordingly, the unique code UC(a) has different values each time generated.
- the bit with high variability can be found in the fabrication process.
- mask data to mask the bit with high variability can be created.
- the bit with high variability contained in the unique code UC(a) can be eliminated. Because the position of the bit with high variability differs from device to device, the mask data is data unique to the semiconductor device.
- the bit with low variability varies due to external factors, remaining charges and the like, and it is thus difficult to make estimation. Therefore, the bit with low variability is processed using an ECC code, such as BCH code or Reed-Solomon code, generated during fabrication.
- ECC code such as BCH code or Reed-Solomon code
- Fig. 3 is a flowchart to explain an operation of the common key generation unit 13
- Fig. 4 is a table showing an example of a unique code processed in the common key generation unit 13.
- the common key generation unit 13 reads the unique code UG(a) from the unique code generation unit 11 (Step S11).
- the unique code UC(a) read in this step is a unique code on which error correction for eliminating a bit with a variable value is not made.
- the common key generation unit 13 masks the read unique code UC(a) using the mask data contained in the correction data CD(a) (Step S12).
- the mask data is data for masking a bit with a high error rate having a variable bit value among the bits of the unique code UC(a).
- the mask data is "0".
- the other bits are bits with a low error rate or bits with a stable value, the mask data is "1".
- the mask data for the bit that needs to be masked is "0"
- the mask data for the bit that does not need to be masked is "1".
- masked unique code UC(a)' in which the first bit and the sixth bit of the unique code UC(a) are eliminated can be obtained (the bits eliminated by masking are indicated by "X"). After that, the masked unique code UC(a) is left-justified.
- the common key generation unit 13 makes a correction to remove the error of the bit with a low degree of variability contained in the masked unique code UC(a)', thereby obtaining a unique code UC(a)" (Step S13).
- the first bit is corrected from "0" to "1".
- the common key generation unit 13 performs a specified operation on the error-corrected unique code UC(a)" using an operation parameter contained in the correction data CD(a) (Step S14).
- NOT operation is performed on the error-corrected unique code UC(a)".
- the unique code UC(a) after this operation is the common key CK(a).
- the NOT operation is just one example, and any operation may be performed on the error-corrected unique code UC(a)".
- the common key CK(a) can be generated as a code that is not apparently similar to the unique code UC(a). This further enhances the security level. Furthermore, the operation performed on the error-corrected unique code UC(a)" may be skipped. In this case, the unique code UC(a)" processed using the mask data and the ECC code serves as the common key CK(a). The common key CK(a) generated in this manner is output to the storage unit 12 and the encryption unit 14.
- the mask code, the ECC code and the operation parameter contained in the correction data CD(a) are generated in advance as unique data of the semiconductor device 10 and stored in the storage unit 12.
- a method of generating the correction data CD(a) is described later (cf. fifth embodiment, Fig. 14 ). Further, in order to extract a bit with high variability contained in the unique code UC(a) read from the unique code generation unit 11, reading of the unique code UC(a) is performed a plurality of times and then the ECC code is generated on the basis of the masked unique code UC(a)'.
- the common key generation unit 13 has the function of generating the common key CK(a) and also has the function of correcting the unique code UC(a) using the correction data CD(a).
- a secret key generation unit 23 shown in Fig. 1 , a secret key generation unit 33 shown in Fig. 5 , a secret key generation unit 53 and a public key generation unit 63 shown in Fig. 7 , common key generation units 73 and 83 shown in Fig. 9 , common key generation units 113 and 123 shown in Fig. 12 , and common key generation units 143 and 153 shown in Fig. 15 also function as a unique code correction unit that corrects the unique code UC using the correction data CD.
- the key generation unit is referred to as a common key generation unit, a secret key generation unit or a public key generation unit according to the key to be generated in this specification for the sake of convenience, the configuration and operation of those units are basically the same.
- the common key CK(a) is a single-use (one-time) key or a fixed key according to usage.
- the correction data CD(a) is determined so as to obtain a bit pattern as the common key CK(a) from a bit pattern obtained as the unique code UC(a) of the semiconductor device 10, and therefore a plurality of correction data CD(a) can be easily generated.
- the common key CK(a) is a single-use key to be used for each communication session between ICa and ICb
- the correction data CD(a) is determined so as to obtain different bit patterns for a plurality of different correction data CD(a).
- the encryption unit 14 in Fig. 1 encrypts the common key CK(a) generated in the common key generation unit 13 by using a public key PK(b) of the semiconductor device 20.
- the public key PK(b) to be used for encryption may be transmitted from the semiconductor device 20 to the semiconductor device 10 in advance and stored in the storage unit 12.
- the public key PK(b) to be used for encryption may be directly supplied from the semiconductor device 20 to the encryption unit 14 at the time when the encryption unit 14 encrypts the common key CK(a).
- the semiconductor device 20 includes a unique code generation unit 21, a storage unit 22, a secret key generation unit 23, and a decryption unit 24.
- the unique code generation unit 21 generates a unique code (second unique code) UC(b) having a value unique to the semiconductor device 20 and containing a random error and outputs it to the secret key generation unit 23.
- the configuration and operation of the unique code generation unit 21 are basically the same as the unique code generation unit 11 described above.
- the storage unit 22 can store correction data (second correction data) CD(b), a public key PK(b), and a common key CK(a) decrypted by the decryption unit.
- the storage unit 22 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(b) and the public key PK(b) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 22 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 20 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 20 may be done on the common key CK(a) stored in the nonvolatile memory.
- the secret key generation unit 23 generates a secret key SK(b) of the semiconductor device 20 using the unique code UC(b) and the correction data CD(b). Note that a method of generating the secret key SK(b) in the secret key generation unit 23 is basically the same as the method of generating the common key CK(a) in the common key generation unit 13 described above.
- the decryption unit 24 decrypts the common key CK(a)" encrypted in the encryption unit 14 of the semiconductor device 10 by using the secret key SK(b) and thereby generates the common key CK(a).
- the semiconductor device ICb (20) transmits the public key PK(b) of the semiconductor device ICb (20) to the semiconductor device ICa (10) (Step S1).
- the transmitted public key PK(b) is stored into the storage unit 12 of the semiconductor device 10.
- the common key generation unit 13 of the semiconductor device 10 generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 11 and the correction data CD(a) stored in the storage unit 12 (Step S2).
- the encryption unit 14 encrypts the common key CK(a) generated in the common key generation unit 13 by using the public key PK(b) of the semiconductor device 20 and thereby generates the encrypted common key CK(a)' (Step S3). Then, the encrypted common key CK(a)' is transmitted from the semiconductor device 10 to the semiconductor device 20 (Step S4).
- the secret key generation unit 23 of the semiconductor device 20 generates the secret key SK(b) of the semiconductor device 20 using the unique code UC(b) and the correction data CD(b) (Step S5).
- the decryption unit 24 decrypts the encrypted common key CK(a)' by using the secret key SK(b) and thereby generates the common key CK(a) (Step S6).
- both of the semiconductor device 10 and the semiconductor device 20 can have the common key CK(a).
- the semiconductor device 10 and the semiconductor device 20 can perform cryptographic communication using the common key CK(a) (Step S7).
- Step S5 may be performed in the semiconductor device 20 in parallel with Steps S2 and S3 performed in the semiconductor device 10.
- the common key CK(x) needs to be shared between ICx and ICy.
- ICx has the common key CK(x)
- ICx encrypts the common key CK(x) using the public key PK(y) of ICy acquired in advance and transmits the encrypted common key CK(x)' to ICy.
- ICy decrypts the encrypted common key Ck(x)' using the secret key SK(y) of ICy and thereby acquires the common key CK(x).
- the common key CK(a) is generated in the common key generation unit 13 of the semiconductor device 10 by using the unique code UC(a) containing an information component unique to the semiconductor device 10 and a variable information component, and the correction data CD(a) that corrects the unique code UC(a).
- the secret key SK(b) of the semiconductor device 20 is generated in the secret key generation unit 23 of the semiconductor device 20 by using the unique code UC(b) containing an information component unique to the semiconductor device 20 and a variable information component, and the correction data CD(b) that corrects the unique code UC(b).
- the secret key SK(b) needs to be a key corresponding to the public key PK(b)
- Methods of analyzing a semiconductor device for unauthorized acquisition of data are as follows.
- a microcomputer with a high security level (which is referred to hereinafter as a secure microcomputer) is used.
- the secure microcomputer has a shield to protect a wiring area, a function of detecting light or signal noise, a function of disrupting the current by combining a random number signal with a signal and the like.
- a characteristic pattern of power consumption arising from execution of a certain operation based on specific data is extracted.
- the characteristic pattern of power consumption can be disrupted by making random selection from a plurality of correction data CD(a) or CD(b) using a random number or the like.
- the correction data CD(a) and CD(b) that are used to generate the common key CK(a) and the secret key SK(b) are information with a relatively high security level, though the security level is lower than that of the common key CK(a) and the secret key SK(b).
- the security microcomputer may be used for the semiconductor devices 10 and 20 in which the correction data CD(a) and CD(b) are stored in order to prevent leakage of the correction data CD(a) and CD(b) to a third party.
- FIG. 5 is a block diagram showing a cryptographic communication system 2 according to this embodiment.
- the cryptographic communication system is applied to a digital signature system.
- the cryptographic communication system 2 according to this embodiment includes a semiconductor device ICa (30) and a semiconductor device ICb (40).
- the semiconductor device 30 includes a unique code generation unit 31, a storage unit 32, a secret key generation unit 33, and a signature data generation unit 34.
- the unique code generation unit 31 generates a unique code UC(a) that is unique to the semiconductor device 30 and outputs it to the secret key generation unit 33.
- the basic configuration and operation of the unique code generation unit 31 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 32 can store correction data CD(a), plain text Plane(a), and a public key PK(a) of the semiconductor device 30 in a nonvolatile memory.
- the secret key generation unit 33 generates a secret key SK(a) of the semiconductor device 30 using the unique code UC(a) output from the unique code generation unit 31 and the correction data CD(a) stored in the storage unit 32. Note that the secret key generation unit 33 functions as a unique code correction unit.
- the basic configuration and operation of the secret key generation unit 33 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the signature data generation unit 34 generates signature data Sig(a) using the secret key SK(a) generated in the secret key generation unit 33 and the plain text Plane(a) stored in the storage unit 32. In other words, the signature data generation unit 34 executes a signature generation algorithm in the digital signature scheme.
- the semiconductor device 40 includes a storage unit 41 and a verification unit 42.
- the storage unit 41 can store the public key PK(a) of the semiconductor device 30.
- the verification unit 42 executes a verification algorithm in the digital signature scheme. Specifically, the verification unit 42 generates verification data using the signature data Sig(a) and the public key PK(a) of the semiconductor device 30.
- the signature data Sig(a) is data generated by encrypting the plain text Plane(a) using the secret key SK(a) of the semiconductor device 30.
- the verification data obtained by decrypting the signature data Sig(a) using the public key PK(a) of the semiconductor device 30 is data corresponding to the plain text Plane(a) transmitted from the semiconductor device 30.
- the verification unit 42 compares the verification data with the plain text Plane(a) and, when the verification data and the plain text Plane(a) match, it can be determined that the semiconductor device 30 has the secret key SK(a).
- the public key PK(a) supplied from the semiconductor device 30 may be directly supplied to the verification unit 42 of the semiconductor device 40.
- the semiconductor device 30 (which corresponds to a signer) transmits the public key PK(a) of the semiconductor device 30 to the semiconductor device 40 (which corresponds to a verifier) (Step S21).
- the secret key generation unit 33 of the semiconductor device 30 generates the secret key SK(a) of the semiconductor device 30 using the unique code UC(a) output from the unique code generation unit 31 and the correction data CD(a) stored in the storage unit 32 (Step S22).
- the signature data generation unit 34 of the semiconductor device 30 executes a signature generation algorithm in the digital signature scheme. Specifically, the signature data generation unit 34 generates the signature data Sig(a) using the secret key SK(a) generated in the secret key generation unit 33 and the plain text Plane(a) stored in the storage unit 32 (Step S23).
- the signature data Sig(a) generated in the signature data generation unit 34 is transmitted to the verification unit 42 of the semiconductor device 40 (Step S24). Further, the plain text Plane(a) is transmitted to the verification unit 42 of the semiconductor device 40 (Step S25). Note that, although the case where the plain text Plane(a) is stored in the storage unit 32 is shown in Fig. 5 , the plain text Plane(a) may be directly supplied from outside to the signature data generation unit 34 and the verification unit 42.
- the verification unit 42 of the semiconductor device 40 executes a verification algorithm in the digital signature scheme. Specifically, the verification unit 42 generates verification data using the signature data Sig(a) and the public key PK(a) of the semiconductor device 30, and compares the verification data with the plain text Plane(a) (Step S26). When the verification data and the plain text Plane(a) match (when the verification algorithm accepts the signature data Sig(a)), the verification unit 42 determines that the signature data Sig(a) created by the semiconductor device 30 is valid. In other words, it is determined that the semiconductor device 30 has the secret key SK(a).
- the verification unit 42 determines that the signature data Sig(a) created by the semiconductor device 30 is invalid. In other words, it is determined that the semiconductor device 30 does not have the secret key SK(a). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent.
- ICx needs to have a secret key SK(x).
- the secret key SK(x) is stored in a nonvolatile memory (storage unit) of the semiconductor device ICx. Therefore, if unauthorized analysis of the semiconductor device is made, leakage of important data such as the secret key SK(x) occurs.
- the secret key SK(a) of the semiconductor device 30 is generated in the secret key generation unit 33 of the semiconductor device 30 by using the unique code UC(a) unique to the semiconductor device 30 and the correction data CD(a) stored in the storage unit 32. Because the secret key SK(a), which is important data, is not directly stored in the storage unit 32, leakage of the secret key SK(a) does not occur even if unauthorized analysis of the semiconductor device is made. Therefore, even when the semiconductor device 30 and the semiconductor device 40 are configured using a general-purpose microcomputer with a relatively low security level, a high security level can be achieved. Note that the secure microcomputer may be used for the semiconductor devices 30 and 40 in order to further enhance the security level of the cryptographic communication system composed of the semiconductor device 30 and the semiconductor device 40.
- FIG. 7 is a block diagram showing a cryptographic communication system 3 according to this embodiment.
- the cryptographic communication system is applied to a digital signature system.
- the cryptographic communication system 2 according to the second embodiment transmits the public key PK(a) of the semiconductor device 30 to the semiconductor device 40 in Step S21, in the cryptographic communication system 3 according to this embodiment, a public key PK(a) of a semiconductor device 50 is generated using a public key generation unit 63.
- the cryptographic communication system 3 includes a semiconductor device ICa (50) and a semiconductor device ICb (60).
- the semiconductor device 50 includes a unique code generation unit 51, a storage unit 52, a secret key generation unit 53, and a signature data generation unit 54.
- the unique code generation unit 51 generates a unique code UC(a) that is unique to the semiconductor device 50 and outputs it to the secret key generation unit 53.
- the basic configuration and operation of the unique code generation unit 51 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 52 can store correction data CD(a) and plain text Plane(a) in a nonvolatile memory.
- the secret key generation unit 53 generates a secret key SK(a) of the semiconductor device 50 using the unique code UC(a) output from the unique code generation unit 51 and the correction data CD(a) stored in the storage unit 52. Note that the secret key generation unit 53 functions as a unique code correction unit.
- the basic configuration and operation of the secret key generation unit 53 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the signature data generation unit 54 generates signature data Sig(a) using the secret key SK(a) generated in the secret key generation unit 53 and the plain text Plane(a) stored in the storage unit 52. In other words, the signature data generation unit 54 executes a signature generation algorithm in the digital signature scheme.
- the semiconductor device 60 includes a unique code generation unit 61, a storage unit 62, a public key generation unit 63, and a verification unit 64.
- the unique code generation unit 61 generates a unique code UC(b) that is unique to the semiconductor device 60 and outputs it to the public key generation unit 63.
- the basic configuration and operation of the unique code generation unit 61 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 62 can store correction data CD(b) in a nonvolatile memory.
- the public key generation unit 63 generates a public key PK(a) of the semiconductor device 50 using the unique code UC(b) output from the unique code generation unit 61 and the correction data CD(b) stored in the storage unit 62. Note that the public key generation unit 63 functions as a unique code correction unit.
- the basic configuration and operation of the public key generation unit 63 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the verification unit 64 executes a verification algorithm in the digital signature scheme. Specifically, the verification unit 64 generates verification data using the signature data Sig(a) and the public key PK(a) of the semiconductor device 50.
- the signature data Sig(a) is data generated by encrypting the plain text Plane(a) using the secret key SK(a) of the semiconductor device 50.
- the verification data obtained by decrypting the signature data Sig(a) using the public key PK(a) of the semiconductor device 50 is data corresponding to the plain text Plane (a) transmitted from the semiconductor device 50. Therefore, the verification unit 64 compares the verification data with the plain text Plane(a) and, when the verification data and the plain text Plane(a) match, it can be determined that the semiconductor device 50 has the secret key SK(a).
- the secret key generation unit 53 of the semiconductor device 50 (which corresponds to a signer) generates the secret key SK(a) of the semiconductor device 50 using the unique code UC(a) output from the unique code generation unit 51 and the correction data CD(a) stored in the storage unit 52 (Step S31).
- the signature data generation unit 54 of the semiconductor device 50 executes a signature generation algorithm in the digital signature scheme. Specifically, the signature data generation unit 54 generates the signature data Sig(a) using the secret key SK(a) generated in the secret key generation unit 53 and the plain text Plane(a) stored in the storage unit 52 (Step S32).
- the public key generation unit 63 of the semiconductor device 60 (which corresponds to a verifier) generates the public key PK(a) of the semiconductor device 50 using the unique code UC(b) output from the unique code generation unit 61 and the correction data CD(b) stored in the storage unit 62 (Step S33).
- the signature data Sig(a) generated in the signature data generation unit 54 is transmitted to the verification unit 64 of the semiconductor device 60 (Step S34). Further, the plain text Plane(a) is transmitted to the verification unit 64 of the semiconductor device 60 (Step S35). Note that, although the case where the plain text Plane(a) is stored in the storage unit 52 is shown in Fig. 7 , the plain text Plane (a) may be directly supplied from outside to the signature data generation unit 54 and the verification unit 64.
- the verification unit 64 of the semiconductor device 60 executes a verification algorithm in the digital signature scheme. Specifically, the verification unit 64 generates verification data using the signature data Sig(a) and the public key PK(a) of the semiconductor device 50, and compares the verification data with the plain text Plane(a) (Step S36). When the verification data and the plain text Plane(a) match (when the verification algorithm accepts the signature data Sig(a)), the verification unit 64 determines that the signature data Sig(a) created by the semiconductor device 50 is valid. In other words, it is determined that the semiconductor device 50 has the secret key SK(a).
- the verification unit 64 determines that the signature data Sig(a) created by the semiconductor device 50 is invalid. In other words, it is determined that the semiconductor device 50 does not have the secret key SK(a). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent.
- the secret key SK(a) of the semiconductor device 50 is generated in the secret key generation unit 53 of the semiconductor device 50 by using the unique code UC(a) unique to the semiconductor device 50 and the correction data CD(a). Because the secret key SK(a), which is important data, is not directly stored in the storage unit 52, leakage of the secret key SK(a) being important data does not occur even if unauthorized analysis of the semiconductor device is made. Therefore, even when the semiconductor device 50 and the semiconductor device 60 are configured using a general-purpose microcomputer with a relatively low security level, a high security level can be achieved.
- the public key PK(a) of the semiconductor device 50 is generated in the public key generation unit 63 of the semiconductor device 60 by using the unique code UC(b) and the correction data CD(b). Because there is no need to transmit the public key PK(a) from the semiconductor device 50 to the semiconductor device 60, it is possible to prevent leakage of the cryptographic method in use to a third party, which further enhances the security of the cryptographic communication system.
- the secure microcomputer may be used for the semiconductor devices 50 and 60 in order to further enhance the security level of the cryptographic communication system composed of the semiconductor device 50 and the semiconductor device 60.
- the correction data CD(a) and CD(b) that are used for generating the common key and the secret key are stored in the semiconductor device.
- the correction data CD(a) and CD(b) that are used for generating the common key and the secret key are also information with a high security level. It is thus preferred to construct a cryptographic communication system in which the correction data CD(a) and CD(b) are not leaked to a third party.
- the correction data to be used for generating the common key is not stored in semiconductor devices 70 and 80, and a semiconductor device 90 including a database 91 that collectively manages the correction data is placed. Because the correction data with a high security level is stored in the database 91 of the semiconductor device 90, it is preferred to configure the semiconductor device 90 using the secure microcomputer. On the other hand, information of a common key CK(1) with a high security level is not stored in a nonvolatile memory in the semiconductor devices 70 and 80, the semiconductor devices 70 and 80 can be configured using general-purpose microcomputers.
- the common key CK(1) is temporarily stored in storage units 72 and 82, because the common key CK(1) is stored in a volatile memory, information of the common key CK(1) is erased when the semiconductor devices 70 and 80 are powered off. Accordingly, the common key CK(1) with a high security level is not stored in the semiconductor devices 70 and 80.
- the cryptographic communication system according to this embodiment is described in detail hereinbelow.
- the cryptographic communication system 4 shown in Fig. 9 includes semiconductor devices 70, 80 and 90.
- the semiconductor device (first semiconductor device) 70 includes a unique code generation unit 71, a storage unit 72, and a common key generation unit (first common key generation unit) 73.
- the unique code generation unit 71 generates a unique code UC(a) that is unique to the semiconductor device 70 and outputs it to the common key generation unit 73.
- the basic configuration and operation of the unique code generation unit 71 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 72 stores the common key CK(1) generated in the common key generation unit 73 in a volatile memory.
- the common key CK(1) is erased when the semiconductor device 70 is powered off.
- the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 70 may be done on the common key CK(1) stored in the nonvolatile memory.
- the common key generation unit 73 generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 71 and correction data (first correction data) CD(1,a) supplied from the semiconductor device 90.
- the common key generation unit 73 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 73 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the semiconductor device (second semiconductor device) 80 includes a unique code generation unit 81, a storage unit 82, and a common key generation unit (second common key generation unit) 83.
- the unique code generation unit 81 generates a unique code UC(b) that is unique to the semiconductor device 80 and outputs it to the common key generation unit 83.
- the basic configuration and operation of the unique code generation unit 81 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 82 stores the common key CK(1) generated in the common key generation unit 83 in a volatile memory.
- the common key CK(1) is erased when the semiconductor device 80 is powered off.
- the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 80 may be done on the common key CK(1) stored in the nonvolatile memory.
- the common key generation unit 83 generates the common key CK(1) using the unique code UC(b) output from the unique code generation unit 81 and correction data (second correction data) CD(1,b) supplied from the semiconductor device 90.
- the common key generation unit 83 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 83 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the semiconductor device (third semiconductor device) 90 includes the database 91 that stores the correction data.
- Fig. 10 is a table showing an example of data stored in the database 91.
- correction data CD(1,a), CD(1, b), ...) associated with information of the semiconductor devices (ICa, ICb, ICc, ..., ICz) and public keys generated in the semiconductor devices (CK(1), CK(2), CK(3), ..., CK(n)) are stored in the database 91.
- the correction data CD(1,a) is transmitted to the semiconductor device ICa.
- the correction data CD(1,b) is transmitted to the semiconductor device ICb.
- the correction data CD(3,a) is transmitted to the semiconductor device ICa.
- the correction data CD(3,b) is transmitted to the semiconductor device ICb.
- the same common key CK(1) can be generated by performing different operations on the error-corrected unique codes UC(a)'' and UC(b) " using the operation parameter (see the first embodiment).
- the common key CK can be changed by changing the operation parameter of the correction data CD.
- a plurality of common keys can be generated like the common keys CK(1), CK(2), CK(3), ..., CK(n) shown in Fig. 10 by changing the operation parameter of the correction data CD.
- the common key CK of the semiconductor devices 70 and 80 can be changed easily, so that the security level can be easily enhanced.
- the correction data CD that is transmitted from the semiconductor device 90 to the semiconductor devices 70 and 80 is information with a high security level, when transmitting the correction data CD to the semiconductor devices 70 and 80, the correction data CD may be encrypted before transmission using the public key cryptosystem.
- the semiconductor device 70 has the secret key of the semiconductor device 70, for example, and the semiconductor device 90 encrypts the correction data CD(1,a) using the public key of the semiconductor device 70 when transmitting the correction data CD(1,a). Then, the semiconductor device 70 decrypts the encrypted correction data CD(1,a) using the secret key, so that the encrypted correction data can be transmitted from the semiconductor device 90 to the semiconductor device 70.
- the semiconductor device ICs (90) transmits the correction data CD(1,a) to the semiconductor device ICa (70) (Step S41).
- the common key generation unit 73 of the semiconductor device 70 generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 71 and the correction data CD(1,a) transmitted from the semiconductor device 90 (Step S42).
- the semiconductor device ICs (90) transmits the correction data CD(1,b) to the semiconductor device ICb (80) (Step S43).
- the common key generation unit 83 of the semiconductor device 80 generates the common key CK(1) using the unique code UC(b) output from the unique code generation unit 81 and the correction data CD(1,b) transmitted from the semiconductor device 90 (Step S44).
- both of the semiconductor device 70 and the semiconductor device 80 can have the common key CK(1).
- the semiconductor device 70 and the semiconductor device 80 can perform cryptographic communication using the common key CK(1) (Step S45). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent.
- the correction data CD when transmitting the correction data CD from the semiconductor device 90 to the semiconductor device 70 or 80, the correction data CD may be transmitted from the semiconductor device 90 to the semiconductor device 70 or 80 at regular intervals. Alternatively, the correction data CD may be transmitted from the semiconductor device 90 to the semiconductor device 70 or 80 at the timing when a request for transmission of the correction data CD is made from the semiconductor device 70 or 80.
- the semiconductor device 90 and the semiconductor devices 70 and 80 may be connected to each other via wired or wireless. Further, the semiconductor device 90 and the semiconductor devices 70 and 80 may be configured to be connected to each other only at the time of transmitting and receiving the correction data CD. Furthermore, the semiconductor device 90 may transmit the correction data CD to the semiconductor devices 70 and 80 through the Internet. In this case, it is preferred to encrypt the correction data CD using the above method for the sake of security.
- the system may be configured in such a way that a plurality of sets of semiconductor devices communicate with each other using different common keys CK.
- the semiconductor devices ICd, ICe and ICf may be configured to communicate with one another using the common key CK(2)
- the semiconductor devices ICg, ICh and ICi may be configured to communicate with one another using the common key CK(3).
- the correction data CD(2,d), CD(2,e) and CD(2,f) for generating the common key CK(2) are transmitted from the semiconductor device 90 to the semiconductor devices ICd, ICe and ICf, respectively.
- the correction data CD(3,g), CD(3,h) and CD(3,i) for generating the common key CK(3) are transmitted from the semiconductor device 90 to the semiconductor devices ICg, ICh and ICi, respectively.
- the semiconductor device 90 that collectively manages the correction data CD is included.
- the correction data CD that is used for generating the common key CK in the semiconductor devices 70 and 80 which enhances the security of the cryptographic communication system.
- the correction data with a high security level is stored in the database 91 of the semiconductor device 90, it is preferred to configure the semiconductor device 90 using the secure microcomputer.
- information of the common key CK with a high security level is not stored in a nonvolatile memory in the semiconductor devices 70 and 80, the semiconductor devices 70 and 80 can be configured using general-purpose microcomputers.
- secure microcomputers may be used for the semiconductor devices 70 and 80 in order to further enhance the security level of the cryptographic communication system.
- the common key CK of each semiconductor device can be changed easily. It is thus possible to easily change the common key CK of the semiconductor devices 70 and 80 at regular intervals, which further enhances the security of the cryptographic communication system.
- FIG. 12 is a block diagram showing a cryptographic communication system according to this embodiment.
- correction data is collectively managed in the database 91 in the cryptographic communication system described in the fourth embodiment, correction data to be transmitted to a semiconductor device ICa (110) and a semiconductor device ICb (120) is generated using a correction data generation unit 132 included in a semiconductor device 130.
- the other configuration is basically the same as that of the cryptographic communication system according to the fourth embodiment. This is described in detail hereinbelow.
- a cryptographic communication system 5 shown in Fig. 12 includes semiconductor devices 110, 120 and 130.
- the semiconductor device 110 includes a unique code generation unit 111, a storage unit 112 and a common key generation unit 113.
- the unique code generation unit 111 generates a unique code UC(a) that is unique to the semiconductor device 110 and outputs it to the common key generation unit 113 and the correction data generation unit 132 of the semiconductor device 130.
- the basic configuration and operation of the unique code generation unit 111 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 112 stores a common key CK(1) generated in the common key generation unit 113 in a volatile memory.
- the common key CK(1) is erased when the semiconductor device 110 is powered off.
- the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 110 may be done on the common key CK(1) stored in the nonvolatile memory.
- the common key generation unit 113 generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 111 and correction data CD(1,a) supplied from the semiconductor device 130.
- the common key generation unit 113 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 113 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the semiconductor device 120 includes a unique code generation unit 121, a storage unit 122 and a common key generation unit 123.
- the unique code generation unit 121 generates a unique code UC(b) that is unique to the semiconductor device 120 and outputs it to the common key generation unit 123 and the correction data generation unit 132 of the semiconductor device 130.
- the basic configuration and operation of the unique code generation unit 121 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 122 stores a common key CK(1) generated in the common key generation unit 123 in a volatile memory.
- the common key CK(1) is erased when the semiconductor device 120 is powered off.
- the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 120 may be done on the common key CK(1) stored in the nonvolatile memory.
- the common key generation unit 123 generates the common key CK(1) using the unique code UC(b) output from the unique code generation unit 121 and correction data CD(1,b) supplied from the semiconductor device 130.
- the common key generation unit 123 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 123 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the semiconductor device 130 includes a storage unit 131 and a correction data generation unit 132.
- the storage unit 131 stores the common key CK(1) in a nonvolatile memory.
- the information of the common key CK(1) is not erased even when the semiconductor device 130 is powered off.
- the semiconductor devices 110 and 120 may be configured using general-purpose microcomputers as in the case of the fourth embodiment.
- the correction data generation unit 132 generates the correction data CD(1,a) using the unique code UC(a) of the semiconductor device 110 and the common key CK(1) stored in the storage unit 131. Further, the correction data generation unit 132 generates the correction data CD(1,b) using the unique code UC(b) of the semiconductor device 120 and the common key CK(1) stored in the storage unit 131.
- the correction data generation unit 132 acquires the unique code UC(a) a plurality of times from the semiconductor device ICa (110) (Step S61). Next, the correction data generation unit 132 statistically processes the unique code UC(a) acquired in Step S61, and classifies the respective bits of the unique code UC(a) into (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). Then, the correction data generation unit 132 generates mask data using the (2) bits with high variability (Step S62).
- information indicating the position of the bit that varies with higher probability than a specified threshold among the bits of the unique code UC(a) is set as the mask data.
- the position of the bit with high variability i.e. the position to be masked
- the correction data generation unit 132 masks the unique code UC(a) using the mask data generated in Step S62 and eliminates the bit with high variability. It then generates an ECC code for correcting the error of the masked unique code UC(a)' (i.e. the unique code containing bits with a stable value and bits with low variability) (Step S63).
- the ECC code is BCH code or Reed-Solomon code, for example.
- the correction data generation unit 132 generates an operation parameter using the unique code UC(a) " processed using the mask data generated in Step S62 and the ECC code generated in Step S63 (which is the unique code containing bits with a stable value) and the common key CK(1) stored in the storage unit 131 (Step S64).
- the operation parameter is a parameter required to generate the common key CK(1) from the corrected unique code UC(a)".
- the correction data generation unit 132 transmits the mask data, the ECC code and the operation parameter generated by the above process as the correction data CD(1,a) to the semiconductor device ICa (110) (Step S65).
- Step S51 the semiconductor device ICa (110) transmits the unique code UC(a) to the correction data generation unit 132 of the semiconductor device Ics (130) (Step S51).
- the correction data generation unit 132 of the semiconductor device 130 generates the correction data CD(1,a) using the transmitted unique code UC(a) and the common key CK(1) (Step S52).
- Step S51 it is necessary to acquire the unique code UC(a) a plurality of times.
- Step S51 is repeated to acquire the unique code UC(a) a plurality of times.
- the generated correction data CD(1,a) is transmitted to the semiconductor device 110 (Step S53).
- the common key generation unit 113 of the semiconductor device 110 generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 111 and the correction data CD(1,a) transmitted from the semiconductor device 130 (Step S54).
- the semiconductor device ICb (120) transmits the unique code UC(b) to the correction data generation unit 132 of the semiconductor device ICs (130) (Step S55).
- the correction data generation unit 132 of the semiconductor device 130 generates the correction data CD(1,b) using the transmitted unique code UC(b) and the common key CK(1) (Step S56).
- Step S55 is repeated to acquire the unique code UC(b) a plurality of times.
- the generated correction data CD(1,b) is transmitted to the semiconductor device 120 (Step S57).
- the common key generation unit 123 of the semiconductor device 120 generates the common key CK(1) using the unique code UC(b) output from the unique code generation unit 121 and the correction data CD(1,b) transmitted from the semiconductor device 130 (Step S58).
- both of the semiconductor device 110 and the semiconductor device 120 can have the common key CK(1).
- the semiconductor device 110 and the semiconductor device 120 can perform cryptographic communication using the common key CK(1.) (Step S59). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. For example, Steps S51 to S54 and Steps S55 to S58 may be performed in parallel.
- the semiconductor device 130 that collectively manages the correction data is included.
- the correction data with a high security level is stored in the database 131 of the semiconductor device 130, it is preferred to configure the semiconductor device 130 using the secure microcomputer.
- information of the common key CK with a high security level is not stored in a nonvolatile memory in the semiconductor devices 110 and 120, the semiconductor devices 110 and 120 can be configured using general-purpose microcomputers.
- secure microcomputers may be used for the semiconductor devices 110 and 120 in order to further enhance the security level of the cryptographic communication system.
- FIG. 15 is a block diagram showing a cryptographic communication system according to this embodiment.
- the cryptographic communication system according to the fifth embodiment the case where the semiconductor device ICa (110) and the semiconductor device ICb (120) have the same common key CK(1) is described.
- a semiconductor device ICa (140) and a semiconductor device ICb (150) have different common keys and communicate with each other through a semiconductor device ICs (160).
- the other configuration is basically the same as that of the cryptographic communication system according to the fifth embodiment. This is described in detail hereinbelow.
- a cryptographic communication system 6 shown in Fig. 15 includes semiconductor devices 140, 150 and 160.
- the semiconductor device 140 includes a unique code generation unit 141, a storage unit 142 and a common key generation unit 143.
- the unique code generation unit 141 generates a unique code UC(a) that is unique to the semiconductor device 140 and outputs it to the common key generation unit 143 and the correction data generation unit 162 of the semiconductor device 160.
- the basic configuration and operation of the unique code generation unit 141 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 142 stores a common key (first common key) CK(1) generated in the common key generation unit 143 in a volatile memory.
- the common key CK(1) is erased when the semiconductor device 140 is powered off.
- the common key generation unit 143 generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 141 and correction data CD(1,a) supplied from the semiconductor device 160.
- the common key generation unit 143 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 143 are the same as those of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the semiconductor device 150 includes a unique code generation unit 151, a storage unit 152 and a common key generation unit 153.
- the unique code generation unit 151 generates a unique code UC(b) that is unique to the semiconductor device 150 and outputs it to the common key generation unit 153 and the correction data generation unit 162 of the semiconductor device 160.
- the basic configuration and operation of the unique code generation unit 151 are the same as those of the unique code generation unit 11 described in the first embodiment and redundant explanation thereof is omitted.
- the storage unit 152 stores a common key (second common key) CK(2) generated in the common key generation unit 153 in a volatile memory.
- the common key CK(2) is erased when the semiconductor device 150 is powered off.
- the common key generation unit 153 generates the common key CK(2) using the unique code UC(b) output from the unique code generation unit 151 and correction data CD(2,b) supplied from the semiconductor device 160.
- the common key generation unit 153 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 153 are the same as those, of the common key generation unit 13 described in the first embodiment and redundant explanation thereof is omitted.
- the semiconductor device 160 includes a storage unit 161 and a correction data generation unit 162.
- the storage unit 161 stores the common key CK(1) and the common key CK(2) in a nonvolatile memory.
- the information of the common key CK(1) and the common key CK(2) are not erased even when the semiconductor device 160 is powered off.
- the semiconductor devices 140 and 150 may be configured using general-purpose microcomputers as in the case of the fifth embodiment.
- the correction data generation unit 162 generates the correction data CD(1,a) using the unique code UC(a) of the semiconductor device 140 and the common key CK(1) stored in the storage unit 161. Further, the correction data generation unit 162 generates the correction data CD(2,b) using the unique code UC(b) of the semiconductor device 150 and the common key CK(2) stored in the storage unit 161.
- Step S71 the semiconductor device ICa (140) transmits the unique code UC(a) to the correction data generation unit 162 of the semiconductor device ICs (160) (Step S71).
- the correction data generation unit 162 of the semiconductor device 160 generates the correction data CD(1,a) using the transmitted unique code UC(a) and the common key CK(1) (Step S72) .
- Step S71 is repeated to acquire the unique code UC(a) a plurality of times.
- the generated correction data CD(1,a) is transmitted to the semiconductor device 140 (Step S73).
- the common key generation unit 143 of the semiconductor device 140 generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 141 and the correction data CD(1,a) transmitted from the semiconductor device 160 (Step S74).
- the semiconductor device ICb (150) transmits the unique code UC(b) to the correction data generation unit 162 of the semiconductor device ICs (160) (Step S75).
- the correction data generation unit 162 of the semiconductor device 160 generates the correction data CD(2,b) using the transmitted unique code UC(b) and the common key CK(2) (Step S76).
- the correction data generation unit 162 to generate the correction data CD(2,b) it is necessary to acquire the unique code UC(b) a plurality of times.
- Step S75 is repeated to acquire the unique code UC(b) a plurality of times.
- the generated correction data CD(2,b) is transmitted to the semiconductor device 150 (Step S77).
- the common key generation unit 153 of the semiconductor device 150 generates the common key CK(2) using the unique code UC(b) output from the unique code generation unit 151 and the correction data CD(2,b) transmitted from the semiconductor device 160 (Step S78).
- both of the semiconductor device 140 and the semiconductor device 160 can have the common key CK(1).
- the semiconductor device 140 and the semiconductor device 160 can perform cryptographic communication using the common key CK(1) (Step S79).
- both of the semiconductor device 150 and the semiconductor device 160 can have the common key CK(2).
- the semiconductor device 150 and the semiconductor device 160 can perform cryptographic communication using the common key CK(2) (Step S80). Therefore, the semiconductor device 140 and the semiconductor device 150 can communicate through the semiconductor device 160 (gateway configuration). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. For example, Steps S71 to S74 and Steps S75 to S78 may be performed in parallel.
- the semiconductor device 160 that collectively manages the correction data is included.
- the correction data with a high security level is stored in the database 161 of the semiconductor device 160, it is preferred to configure the semiconductor device 160 using the secure microcomputer.
- information of the common key CK with a high security level is not stored in a nonvolatile memory in the semiconductor devices 140 and 150, the semiconductor devices 140 and 150 can be configured using general-purpose microcomputers.
- secure microcomputers may be used for the semiconductor devices 140 and 150 in order to further enhance the security level of the cryptographic communication system.
- Fig. 17 is a block diagram showing a case where the cryptographic communication system according to the first to sixth embodiment is applied to a vehicle-mounted semiconductor device.
- a vehicle 180 includes a gateway unit 170, a fault diagnostic unit 171, an engine control unit 172, a brake control unit 173, a lamp control unit 174, a door lock control unit 175, a key insertion control unit 176, a car navigation system 178, and a DCM (Data Communication Module) 179.
- a gateway unit 170 As shown in Fig. 17 , a vehicle 180 includes a gateway unit 170, a fault diagnostic unit 171, an engine control unit 172, a brake control unit 173, a lamp control unit 174, a door lock control unit 175, a key insertion control unit 176, a car navigation system 178, and a DCM (Data Communication Module) 179.
- DCM Data Communication Module
- the gateway unit 170 is equipment for relaying a network composed of the units 171 to 176 and the car navigation system 178.
- a secure microcomputer ICs is included in the gateway unit 170.
- the fault diagnostic unit 171 is a unit for making a diagnosis whether the components of the vehicle 180 are at fault.
- a semiconductor device ICa is included in the fault diagnostic unit 171.
- the engine control unit 172 is a unit for making electrical control (fuel supply, ignition timing control etc.) of engine operation in a comprehensive manner.
- a semiconductor device ICb is included in the engine control unit 172.
- the brake control unit 173 is a unit for controlling a brake such as ABS (Antilock Brake System).
- a semiconductor device ICc is included in the brake control unit 173.
- the lamp control unit 174 is a unit for controlling a headlight, winker and the like of the vehicle.
- a semiconductor device ICd is included in the lamp control unit 174.
- the door lock control unit 175 is a unit for controlling door lock.
- a semiconductor device ICe and a communication unit for radio communication with a key 177 are included in the door lock control unit 175.
- the key insertion control unit 176 is a unit for determining whether the inserted key 177 is a valid user key or not.
- a semiconductor device ICf and a communication unit for radio communication with the key 177 are included in the key insertion control unit 176.
- a semiconductor device ICg and a communication unit for radio communication with the door lock control unit 175 and the key insertion control unit 176 are included in the key 177.
- General-purpose microcomputers for example, may be used for the semiconductor devices ICa to ICg that are included in the respective units 171 to 176 and the key 177.
- a secure microcomputer ICh is included in the car navigation system 178.
- the DCM 179 is a communication module for transmitting information acquired from the units 171 to 176 in the vehicle to an external server 181 or acquiring information from the server 181.
- the respective units 171 to 176 and the car navigation system 178 are connected to the gateway unit 170, and the units 171 to 176 are configured to be able to communicate with one another through the gateway unit 170.
- the common key that is used for communication between the respective units 171 to 176 and the gateway unit 170 may differ from unit to unit.
- the common key CK(1) may be used for communication between the fault diagnostic unit 171 and the gateway unit 170
- the common key CK(2) may be used for communication between the engine control unit 172 and the gateway unit 170.
- the semiconductor device ICa (140) in the cryptographic communication system 6 according to the sixth embodiment shown in Fig. 15 corresponds to the fault diagnostic unit 171
- the semiconductor device ICb (150) corresponds to the engine control unit 172
- the semiconductor device ICs (160) corresponds to the gateway unit 170.
- the correction data CD that is used to generate the common key to be used for communication between the respective units 171 to 176 and the gateway unit 170 may be stored in the semiconductor device ICs of the gateway unit 170 or the semiconductor device ICh of the car navigation system 178, for example. Further, the correction data CD that is used to generate the common key may be supplied from the server 181. With the correction data CD supplied from the server 181, the common key to be used for communication between the respective units 171 to 176 and the gateway unit 170 can be easily changed.
- the correction data CD supplied from the server 181 may be stored in the semiconductor device ICs of the gateway unit 170 or the semiconductor device ICh of the car navigation system 178, for example.
- the car navigation system 178 may transmit the information (for example, failure information etc.) acquired from the units 171 to 176 to the server 181 through the DCM 179. At this time, communication between the DCM 179 and the server 181 may be encrypted.
- the configuration in which the units 171 to 176 perform communication through the gateway unit 170 is shown.
- the units 171 to 176 may communicate with one another using the same common key.
- the units 171 to 176 are configured to be connected to one another through a common bus, for example.
- the common key stored in the respective units 171 to 176 may be generated using the method described in the first embodiment ( Fig. 1 ), the fourth embodiment ( Fig. 9 ), and the fifth embodiment ( Fig. 12 ), for example.
- FIG. 18 is a block diagram showing a cryptographic communication system according to an eighth embodiment.
- a cryptographic communication system 201 includes a semiconductor device ICa (first semiconductor device) 210 and a semiconductor device ICz (second semiconductor device) 220.
- the semiconductor device ICa (210) establishes a secure network with another semiconductor device (not shown).
- a case where the semiconductor device ICz (220) is added to the secure network including the semiconductor device ICa (210) is described.
- the semiconductor device 210 includes a unique code generation unit 211, a storage unit 212, a common key generation unit (first common key generation unit) 213, and a correction data generation unit 214.
- the unique code generation unit 211 generates a unique code (first unique code) UC(a) having a value unique to the semiconductor device 210 and containing a random error and outputs it to the common key generation unit 213.
- the unique code UC(a) is a value determined by physical properties inherent to an element included in the semiconductor device 210.
- the unique code generation unit 211 may generate the unique code UC(a) using a value at startup of a memory element included in the semiconductor device 210.
- the unique code is a code generated using the property that actually fabricated ICs vary despite that the design of the ICs is the same.
- PUF Physical Unclonable Function
- the storage unit 212 can store correction data (first correction data) CD(a), and a common key (first common key) CK(a) generated in the common key generation unit 213.
- the storage unit 212 includes a volatile memory (for example, SRAM) and a nonvolatile memory (for example, flash memory), for example, and the correction data CD(a) is stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 212 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 210 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 210 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 213 generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 211 and the correction data CD(a) stored in the storage unit 212.
- the unique code UC(a) generated in the unique code generation unit 211 is data containing bit values that vary depending on external factors during generation of the unique code, such as temperature and voltage, for example. Therefore, the unique code UC(a) generated in the unique code generation unit 211 contains three types of bits: (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). In this manner, the unique code UC(a) generated in the unique code generation unit 211 contains (2) bits with high variability and (3) bits with low variability. Accordingly, the unique code UC(a) has different values each time generated.
- the bit with high variability can be found in the fabrication process.
- mask data to mask the bit with high variability can be created.
- the bit with high variability contained in the unique code UC(a) can be eliminated. Because the position of the bit with high variability differs from device to device, the mask data is data unique to the semiconductor device.
- the bit with low variability varies due to external factors, remaining charges and the like, and it is thus difficult to make estimation. Therefore, for the bit with low variability, an ECC code such as BCH code or Reed-Solomon code, for example, is generated during fabrication, and error correction for eliminating a bit with variability is performed using the ECC code.
- An operation of the common key generation unit 213 is specifically described hereinafter.
- Fig. 20 is a flowchart to explain an operation of the common key generation unit 213, and Fig. 21 is a table showing an example of a unique code processed in the common key generation unit 213.
- the common key generation unit 213 reads the unique code UC(a) from the unique code generation unit 211 (Step S111).
- the unique code UC(a) read in this step is a unique code on which error correction for eliminating a bit with variability is not made.
- the common key generation unit 213 masks the read unique code UC(a) using the mask data contained in the correction data CD(a) (Step S112).
- the mask data is data for masking a bit with a high error rate having a variable bit value among the bits of the unique code UC(a).
- the mask data is "0".
- the other bits are bits with a low error rate or bits with a stable value, the mask data is "1".
- the mask data for the bit that needs to be masked is "0"
- the mask data for the bit that does not need to be masked is "1".
- masked unique code UC(a)' By masking the unique code UC(a) using the mask data, masked unique code UC(a)' in which the first bit and the sixth bit of the unique code UC(a) are eliminated can be obtained (the bits eliminated by masking are indicated by "X"). After, that, the masked unique code UC(a)' is left-justified.
- the common key generation unit 213 corrects the error of the bit with a low degree of variability contained in the masked unique code UC(a)', thereby obtaining a unique code UC(a)" (Step S113).
- the first bit is corrected from "0" to "1".
- the common key generation unit 213 performs a specified operation on the error-corrected unique code UC(a)" using an operation parameter contained in the correction data CD(a) (Step S114).
- a specified operation is performed on the error-corrected unique code UC(a) " .
- the unique code UC(a) after this operation is the common key CK(a). Note that the NOT operation is just one example, and any operation may be performed on the error-corrected unique code UC(a) " .
- By changing the operation parameter it is possible to change the common key CK(a) according to need.
- the common key CK(a) can be generated as a code that is not apparently similar to the unique code UC(a). This further enhances the security level. Furthermore, the operation performed on the error-corrected unique code UC(a)" may be skipped. In this case, the unique code UC(a)" processed using the mask data and the ECC code serves as the common key CK(a). The common key CK(a) generated in this manner is output to the storage unit 212.
- the common key generation unit 213 has the function of generating the common key CK(a) and also has the function of correcting the unique code UC(a) using the correction data CD(a). Thus, the common key generation unit 213 functions also as a unique code correction unit.
- the mask code, the ECC code and the operation parameter contained in the correction data CD(a) are generated in advance as unique data of the semiconductor device 210 and stored in the storage unit 212.
- a method of generating the correction data CD(a) is the same as that of the case where the correction data generation unit 214 generates the correction data CD(z).
- the correction data generation unit 214 generates correction data (second correction data) CD(z) using a unique code (second unique code) UC(z) of the semiconductor device 220 and the common key CK(a). An operation when the correction data generation unit 214 generates the correction data is described hereinafter in detail with reference to Fig. 22 .
- the correction data generation unit 214 acquires the unique code UC(z) a plurality of times from the semiconductor device ICz (220) (Step S121).
- the correction data generation unit 214 statistically processes the unique code UC(z) acquired in Step S121, and classifies the respective bits of the unique code UC(z) into (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value).
- the correction data generation unit 214 generates mask data using the (2) bits with high variability (Step S122).
- information indicating the position of the bit that varies with higher probability than a specified threshold among the bits of the unique code UC(z) is set as the mask data.
- the position of the bit with high variability i.e. the position to be masked
- the correction data generation unit 214 masks the unique code UC(z) using the mask data generated in Step S122 and eliminates the bit with high variability. It then generates an ECC code for making a correction to remove the bits with variability of the masked unique code UC(a)' (i.e. the unique code containing bits with a stable value and bits with low variability) (Step S123).
- the ECC code is BCH code or Reed-Solomon code, for example.
- the correction data generation unit 214 generates an operation parameter using the unique code UC(a) " processed using the mask data generated in Step S122 and the ECC code generated in Step S123 (which is the unique code containing bits with a stable value) and the common key CK(a) stored in the storage unit 212 (Step S124).
- the operation parameter is thus a parameter required to generate the common key CK(a) from the corrected unique code UC(z) " .
- the correction data generation unit 214 transmits the mask data, the ECC code and the operation parameter generated by the above process as the correction data CD(z) to the semiconductor device ICz (220) (Step S125).
- Fig. 23 is a diagram showing a case where the correction data CD(z) is generated using a plurality of semiconductor devices ICa, ICb, ICc and ICd.
- the semiconductor devices ICa, ICb, ICc and ICd establish a secure network.
- the semiconductor device ICa executes Steps S121 and S125.
- the semiconductor device ICa functions as a teller with the semiconductor device ICz.
- the semiconductor device ICb executes Step S122 (mask data generation).
- the semiconductor device ICc executes Step S123 (ECC code generation).
- the semiconductor device ICd executes Step S124 (operation parameter generation). Note that the example shown in Fig. 23 is one example, and the semiconductor devices to execute the respective steps may be assigned arbitrarily.
- the semiconductor device 220 shown in Fig. 18 includes a unique code generation unit 221, a storage unit 222, and a common key generation unit (second common key generation unit) 223.
- the unique code generation unit 221 generates a unique code UC(z) having a value unique to the semiconductor device 220 and containing a random error and outputs it to the correction data generation unit 214 and the common key generation unit 223. Note that the configuration and operation of the unique code generation unit 221 is basically the same as the unique code generation unit 211 described above.
- the storage unit 222 can have the common key CK(a) generated in the common key generation unit 223.
- the storage unit 222 stores the common key CK(a) in a volatile memory.
- the storage unit 222 temporarily stores the common key CK(a)
- information of the common key CK(a) is erased when the semiconductor device 220 is powered off.
- the common key CK(a) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 220 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 223 generates the common key (first common key) CK(a) using the unique code UC(z) output from the unique code generation unit 221 and the correction data CD(z) output from the correction data generation unit 214.
- a method of generating the common key CK(a) in the common key generation unit 223 is basically the same as the method of generating the common key CK(a) in the common key generation unit 213 described above.
- the common key generation unit 213 of the semiconductor device ICa (210) generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 211 and the correction data CD(a) stored in the storage unit 212 (Step S101). Then, the semiconductor device ICa (210) starts communication with other semiconductor device ICb to ICy (not shown) using the common key CK(a) (Step S102).
- the semiconductor device 220 transmits the unique code UC(z) of the semiconductor device 220. to the correction data generation unit 214 of the semiconductor device 210 (Step S103).
- the correction data generation unit 214 of the semiconductor device 210 generates the correction data CD(z) using the unique code UC(z) of the semiconductor device 220 and the common key CK(a) stored in the storage unit 212 (Step S104).
- Step S104 For the correction data generation unit 214 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times.
- Step S103 is repeated to acquire the unique code UC(z) a plurality of times.
- the generated correction data CD(z) is transmitted to the common key generation unit 223 of the semiconductor device 220 (Step S105).
- the common key generation unit 223 of the semiconductor device 220 generates the common key CK(a) using the unique code UC(z) output from the unique code generation unit 221 and the correction data CD(z) output from the correction data generation unit 214 (Step S106).
- the added semiconductor device 220 can have the common key CK(a).
- the added semiconductor device (ICz) 220 becomes able to perform cryptographic communication with the semiconductor device (ICa) 210 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S107).
- This process is a process of calculating the correction data CD(z) from the transmitted data UC(z) and sending it back as described above.
- a malicious attacker repeats this process using a prepared ICz or repeatedly transmits different data UC(z) and thereby analyzes an algorithm of the common key generation unit by CD(z) and the current waveform data during the process. Therefore, it is preferred to impose a limit (for example, about three to five times) to the number of times for the flow shown in Fig. 19 .
- the correction data generation unit 214 in the semiconductor device 210 generates the correction data CD(z) for correcting the unique code UC(z) by using the unique code UC(z) having a value unique to the semiconductor device 220 and containing a random error and the common key CK(a), and the common key generation unit 223 in the semiconductor device 220 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of the semiconductor device 220.
- the semiconductor device ICa (210) and the semiconductor device ICz (220) generate the common key CK(a) based on the same rule, so that the security to add the semiconductor device ICz (220) to the secure network including the semiconductor device ICa (210) is guaranteed.
- the common key generation unit 213 in the semiconductor device 210 generates the common key CK(a) using the unique code UC(a) having a value unique to the semiconductor device 210 and the correction data CD(a). Further, the common key generation unit 223 in the semiconductor device 220 generates the common key CK(a) using the unique code UC(z) having a value unique to the semiconductor device 220 and the correction data CD(z). Because the common key CK(a), which is important data, is not directly stored in the storage units 212 and 222, leakage of data of the common key CK(a) does not occur even if unauthorized analysis of the semiconductor device is made. Therefore, in the cryptographic communication system according to this embodiment, it is possible to enhance the security and add the semiconductor device easily and at low cost to the cryptographic communication system in which secure communication is performed.
- Methods of analyzing a semiconductor device for unauthorized acquisition of data are as follows.
- a microcomputer with a high security level (which is referred to hereinafter as a secure microcomputer) is used.
- the secure microcomputer has a shield to protect a wiring area, a function of detecting light or signal noise, a function of disrupting the current by combining a random number signal with a signal and the like.
- the correction data CD(a) that is used to generate the common key CK(a) in the semiconductor device 210 is information with a relatively high security level, though the security level is lower than that of the common key CK(a).
- the security microcomputer may be used for the semiconductor device 210 in which the correction data CD(a) is stored in order to prevent leakage of the correction data CD(a) to a third party.
- the correction data CD(z) that is transmitted from the semiconductor device 210 to the semiconductor device 220 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a).
- the correction data CD(z) may be encrypted using the public key cryptosystem before transmission.
- the semiconductor device 220 for example, has the secret key of the semiconductor device 220, and the semiconductor device 210 encrypts the correction data CD(z) using the public key of the semiconductor device 220 before transmitting the correction data CD(z). Then, the semiconductor device 220 decrypts the encrypted correction data CD(z) using the secret key.
- the encrypted correction data can be thereby transmitted from the semiconductor device 210 to the semiconductor device 220.
- the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- FIG. 24 is a block diagram showing a cryptographic communication system 202 according to this embodiment.
- a unique code UC(z) that is output from a semiconductor device ICz is information with a relatively low security level because it contains error information for its characteristics.
- the unique code UC(z) is not encrypted when transmitting the unique code UC(z) from the semiconductor device ICz to the semiconductor device ICa.
- the unique code UC(z) is information unique to the semiconductor device ICz, though it contains error information, it is preferred to encrypt the unique code UC(z) before transmission.
- the unique code UC(z) is encrypted before transmitting the unique code UC(z) from the semiconductor device ICz to the semiconductor device ICa.
- the cryptographic communication system 202 shown in Fig. 24 includes a semiconductor device ICa (230) and a semiconductor device ICz (240).
- the semiconductor device 230 includes a unique code generation unit 231, a storage unit 232, a common key generation unit 233, a correction data generation unit 234, and a decryption unit 235.
- the unique code generation unit 231 generates a unique code UC(a) that is unique to the semiconductor device 230 and outputs it to the common key generation unit 233.
- the basic configuration and operation of the unique code generation unit 231 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 232 can store correction data CD(a), a public key PK(a) and a secret key SK(a) of the semiconductor device 230, and a common key CK(a) generated in the common key generation unit 233.
- the storage unit 232 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(a), the public key PK(a) and the secret key SK(a) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 232 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 230 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 230 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 233 generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 231 and correction data CD(a) stored in the storage unit 232.
- the common key generation unit 233 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 233 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the correction data generation unit 234 generates correction data (second correction data) CD(z) using a unique code UC(z) of the semiconductor device 240 and the common key CK(a).
- the basic configuration and operation of the correction data generation unit 234 are the same as those of the correction data generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted.
- the decryption unit 235 decrypts a unique code UC(z)_c encrypted by an encryption unit 244 of the semiconductor device 240 using the secret key SK(a) of the semiconductor device 230 and thereby generates the unique code UC(z).
- the semiconductor device 240 includes a unique code generation unit 241, a storage unit 242, a common key generation unit 243, and an encryption unit 244.
- the unique code generation unit 241 generates a unique code UC(z) that is unique to the semiconductor device 240 and outputs it to the encryption unit 244 and the common key generation unit 243.
- the basic configuration and operation of the unique code generation unit 241 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 242 can have the common key CK(a) generated in the common key generation unit 243.
- the storage unit 242 stores the common key CK(a) in a volatile memory.
- the storage unit 242 temporarily stores the common key CK(a)
- information of the common key CK(a) is erased when the semiconductor device 240 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 240 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 243 generates the common key CK(a) using the unique code UC(z) output from the unique code generation unit 241 and the correction data CD(z) output from the correction data generation unit 234.
- the common key generation unit 243 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 243 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the encryption unit 244 encrypts the unique code UC(z) generated in the unique code generation unit 241 by using the public key PK(a) of the semiconductor device 230.
- the public key PK(a) to be used for encryption may be transmitted from the semiconductor device 230 to the semiconductor device 240 in advance and stored in the storage unit 242.
- the public key PK(a) to be used for encryption may be directly supplied from the semiconductor device 230 to the encryption unit 244 at the time when the encryption unit 244 encrypts the unique code UC(z).
- the encrypted unique code UC(z)_c is output to the decryption unit 235 of the semiconductor device 230.
- the common key generation unit 233 of the semiconductor device ICa (230) generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 231 and the correction data CD(a) stored in the storage unit 232 (Step S130). Then, the semiconductor device ICa (230) starts communication with other semiconductor devices ICb to ICy (not shown) using the common key CK(a) (Step S131).
- the semiconductor device ICz (240) makes a request for transmission of the correction data CD(z) to the semiconductor device ICa (230) (Step S132).
- the semiconductor device 230 receives the request for transmission of the correction data CD(z), the semiconductor device 230 transmits the public key PK(a) of the semiconductor device 230 to the semiconductor device 240 (Step S133).
- the encryption unit 244 of the semiconductor device 240 encrypts the unique code UC(z) using the public key PK(a) of the semiconductor device 230 (Step S134).
- the public key PK(a) of the semiconductor device 230 may be prestored in the storage unit 242 of the semiconductor device 240. In this case, Steps S132 and S133 can be skipped.
- the semiconductor device 240 transmits the encrypted unique code UC(z)_c to the decryption unit 235 of the semiconductor device 230 (Step S135).
- the decryption unit 235 of the semiconductor device 230 decrypts the encrypted unique code UC(z)_c by using the secret key SK(a) of the semiconductor device 230 and thereby generates the unique code UC(z) (Step S136).
- the correction data generation unit 234 of the semiconductor device 230 generates the correction data CD(z) using the unique code UC(z) of the semiconductor device 240 and the common key CK(a) stored in the storage unit 232 (Step S137). For the correction data generation unit 234 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Steps S134 to S136 are repeated to acquire the unique code UC(z) a plurality of times.
- the generated correction data CD(z) is transmitted to the common key generation unit 243 of the semiconductor device 240 (Step S138).
- the common key generation unit 243 of the semiconductor device 240 generates the common key CK(a) using the unique code UC(z) output from the unique code generation unit 241 and the correction data CD(z) output from the correction data generation unit 234 (Step S139).
- the added semiconductor device 240 can have the common key CK(a).
- the added semiconductor device (ICz) 240 becomes able to perform cryptographic communication with the semiconductor device (ICa) 230 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S140).
- the correction data generation unit 234 of the semiconductor device 230 generates the correction data CD(z) using the unique code UC(z) unique to the semiconductor device 240 and the common key CK(a), and the common key generation unit 243 of the semiconductor device 240 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of the semiconductor device 240.
- the correction data CD(a) used to generate the common key CK(a) in the semiconductor device 230 and the secret key SK(a) of the semiconductor device 230 are information with a relatively high security level, though the security level is lower than that of the common key CK(a).
- the security microcomputer may be used for the semiconductor device 230 in which the correction data CD(a) and the secret key SK(a) are stored in order to prevent leakage of the correction data CD(a) and the secret key SK(a) to a third party.
- the correction data CD(z) that is transmitted from the semiconductor device 230 to the semiconductor device 240 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a).
- the correction data CD(z) may be encrypted before transmission using the public key cryptosystem.
- the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- the unique code UC(z) of the semiconductor device 240 is encrypted and transmitted to the semiconductor device 230, which further enhances the security of the cryptographic communication system.
- FIG. 26 is a block diagram showing a cryptographic communication system 203 according to this embodiment.
- the cryptographic communication system is applied to a digital signature system.
- the cryptographic communication system 203 according to this embodiment includes a semiconductor device ICa (250), a semiconductor device ICz (260), and a secure server 270.
- the semiconductor device 250 includes a unique code generation unit 251, a storage unit 252, a common key generation unit 253, a correction data generation unit 254, a decryption unit 255, and a verification unit 256.
- the unique code generation unit 251 generates a unique code UC(a) that is unique to the semiconductor device 250 and outputs it to the common key generation unit 253.
- the basic configuration and operation of the unique code generation unit 251 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 252 can store correction data CD(a), a public key PK(a) and a secret key SK(a) of the semiconductor device 250, and a common key CK(a) generated in the common key generation unit 253.
- the storage unit 235 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(a), the public key PK(a) and the secret key SK(a) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 252 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 250 is powered off.
- the common key generation unit 253 generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 251 and correction data CD(a) stored in the storage unit 252.
- the common key generation unit 253 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 253 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the correction data generation unit 254 generates correction data CD(z) using a unique code UC(z) of the semiconductor device 260 and the common key CK(a).
- the basic configuration and operation of the correction data generation unit 254 are the same as those of the correction data generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted.
- the decryption unit 255 decrypts the unique code UC(z)_c encrypted by an encryption unit 264 of the semiconductor device 260 using the secret key SK(a) of the semiconductor device 250 and thereby generates the unique code UC(z).
- the verification unit 256 executes a verification algorithm in the digital signature scheme. Specifically, the verification unit 256 generates verification data using signature data Sig(a) and a public key PK(z) of the semiconductor device 260 and compares the verification data with plain text Plane(a).
- the semiconductor device 260 includes a unique code generation unit 261, a storage unit 262, a common key generation unit 263, an encryption unit 264, and a signature data generation unit 265.
- the unique code generation unit 261 generates a unique code UC(z) that is unique to the semiconductor device 260 and outputs it to the encryption unit 264 and the common key generation unit 263.
- the basic configuration and operation of the unique code generation unit 261 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 262 can store a common key CK(a) generated in the common key generation unit 263, a secret key SK(z) of the semiconductor device 260, and a plain text Plane(z).
- the storage unit 262 includes a volatile memory and a nonvolatile memory, for example, and the secret key SK(z) of the semiconductor device 260 and the plain text Plane(z) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 262 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 260 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 260 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 263 generates the common key CK(a) using the unique code UC(z) output from the unique-code generation unit 261 and the correction data CD(z) output from the correction data generation unit 254.
- the common key generation unit 263 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 263 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the encryption unit 264 encrypts the unique code UC(z) generated in the unique code generation unit 261 by using the public key PK(a) of the semiconductor device 260.
- the public key PK(a) to be used for encryption may be transmitted from the semiconductor device 250 to the semiconductor device 260 in advance and stored in the storage unit 262.
- the public key PK(a) to be used for encryption may be directly supplied from the semiconductor device 250 to the encryption unit 264 at the time when the encryption unit 264 encrypts the unique code UC(z).
- the public key PK(a) may be supplied from the secure server 270.
- the encrypted unique code UC(z)_c is output to the decryption unit 255 of the semiconductor device 250.
- the signature data generation unit 265 generates signature data Sig(z) using the secret key SK(z) of the semiconductor device 260 and the plain text Plane(z). In other words, the signature data generation unit 265 executes a signature generation algorithm in the digital signature scheme.
- the secure server 270 includes a database 271 that stores public keys PK(a), PK(b), ..., PK(z) of semiconductor devices ICa, ICb, ..., ICz in association with the semiconductor devices ICa, ICb, ..., ICz.
- the public key information stored in the database 271 is information with a high security level, it is preferred to use a security microcomputer for the secure server 270.
- the public key information stored in the secure server 270 is transmitted to each semiconductor device in response to a request.
- the common key generation unit 253 of the semiconductor device ICa (250) generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 251 and the correction data CD(a) stored in the storage unit 252 (Step S141). Then, the semiconductor device ICa (250) starts communication with other semiconductor devices ICb to ICy (not shown) using the common key CK(a) (Step S142).
- the semiconductor device ICz (260) transmits semiconductor device information (for example, a unique ID etc.) of the semiconductor device ICz (260) to the semiconductor device ICa (250) (Step S143).
- the semiconductor device 250 makes a request for transmission of a public key of the semiconductor device 260 to the secure server 270 (Step S144).
- the public key of the semiconductor device 260 is used when the verification unit 256 of the semiconductor device 250 verifies signature data.
- the secure server 270 transmits the public key PK(z) of the semiconductor device 260 to the verification unit 256 of the semiconductor device 250 (Step S145).
- the semiconductor device 250 makes a request for transmission of signature data to the semiconductor device 260 (Step S146).
- the semiconductor device 260 receives the request for transmission of signature data, the semiconductor device 260 generates signature data Sig(z) using the secret key SK(z) and the plain text Plane(z) in the signature data generation unit 265.
- the plain text Plane(z) and the generated signature data Sig(z) are transmitted to the verification unit 256 of the semiconductor device 250 (Step S147).
- the verification unit 256 of the semiconductor device 250 executes a verification algorithm in the digital signature scheme (Step S148). Specifically, the verification unit 256 generates verification data using the public key PK(z) of the semiconductor device 260 supplied from the secure server 270 and the signature data Sig(z), and compares the verification data with the plain text Plane(z).
- the signature data Sig(z) is data generated by encrypting the plain text Plane(z) using the secret key SK(z) of the semiconductor device 260.
- the verification data obtained by decrypting the signature data Sig(z) using the public key PK(z) of the semiconductor device 260 is data corresponding to the plain text Plane(z) transmitted from the semiconductor device 260. Therefore, the verification unit 256 compares the verification data with the plain text Plane(z) and, when the verification data and the plain text Plane(z) match, it can be determined that the semiconductor device 260 has the secret key SK(z).
- the verification unit 256 determines that the signature data Sig(z) created by the semiconductor device 260 is valid. Thus, it is determined that the semiconductor device 260 has the secret key SK(z). On the other hand, when the verification data and the plain text Plane(z) do not match (when the verification algorithm rejects the signature data Sig(z)), the verification unit 256 determines that the signature data Sig(z) created by the semiconductor device 260 is invalid.
- the semiconductor device 250 transmits the public key PK(a) of the semiconductor device 250 to the semiconductor device 260 (Step S149).
- the encryption unit 264 of the semiconductor device 260 encrypts the unique code UC(z) by using the public key PK(a) of the semiconductor device 250 (Step S150).
- the public key PK(a) of the semiconductor device 250 may be transmitted from the secure server 270 to the semiconductor device 260 by an instruction from the semiconductor device 250.
- the semiconductor device 260 transmits the encrypted unique code UC(z)_c to the decryption unit 255 of the semiconductor device 250 (Step S151).
- the decryption unit 255 of the semiconductor device 250 decrypts the encrypted unique code UC(z)_c by using the secret key SK(a) of the semiconductor device 250 and thereby generates the unique code UC(z) (Step S152).
- the correction data generation unit 254 of the semiconductor device 250 generates the correction data CD(z) using the unique code UC(z) of the semiconductor device 260 and the common key CK(a) (Step S153). For the correction data generation unit 254 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Steps S150 to S152 are repeated to acquire the unique code UC(z) a plurality of times.
- the generated correction data CD(z) is transmitted to the common key generation unit 263 of the semiconductor device 260 (Step S154).
- the common key generation unit 263 of the semiconductor device 260 generates the common key CK(a) using the unique code UC(z) output from the unique code generation unit 261 and the correction data CD(z) output from the correction data generation unit 254 (Step S155).
- the added semiconductor device 260 can be verified using the digital signature scheme.
- the semiconductor device 260 can have the common key CK(a).
- the added semiconductor device (ICz) 260 becomes able to perform cryptographic communication with the semiconductor device (ICa) 240 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S156).
- the correction data generation unit 254 of the semiconductor device 250 generates the correction data CD(z) using the unique code L3C(z) unique to the semiconductor device 260 and the common key CK(a), and the common key generation unit 263 of the semiconductor device 260 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of the semiconductor device 260.
- the public key information stored in the database 271 of the secure server 270 is information with a high security level. It is thus preferred to use a security microcomputer for the secure server 270.
- the correction data CD(a) used to generate the common key CK(a) and the secret key SK(z) of the semiconductor device 260 are information with a relatively high security level, though the security level is lower than that of the common key CK(a).
- the security microcomputer may be used for the semiconductor devices 250 and 260 in which the correction data CD(a) and the secret key SK(z) are stored in order to prevent leakage of the correction data CD (a) and the secret key SK(z) to a third party.
- the correction data CD(z) that is transmitted from the semiconductor device 250 to the semiconductor device 260 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a).
- the correction data CD(z) may be encrypted before transmission using the public key cryptosystem.
- the encryption unit 264 is included in the semiconductor device 260 and the decryption unit 255 is included in the semiconductor device 250 in order to transmit the unique code UC(z) after encryption.
- the encryption unit 264 and the decryption unit 255 may be omitted and the unique code UC(z) may be transmitted without encryption as in the eighth embodiment.
- the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- the public key information is collectively managed using the secure server 270.
- the public key information is information that is used when verifying a semiconductor device to be added using the digital signature scheme, and it is information with a high security level.
- Fig. 28 is a block diagram showing a cryptographic communication system 204 according to this embodiment.
- a correction data generation program PRG(z) is transmitted from a semiconductor device ICz (290), which is a device to be added, to a semiconductor device ICa (280) rather than including a correction data generation unit for generating correction data CD(z).
- the correction data generation program PRG(z) is then executed in the semiconductor device ICa (280) to thereby generate the correction data Gi7 (z) .
- the cryptographic communication system 204 shown in Fig. 28 includes a semiconductor device ICa (280) and a semiconductor device ICz (290).
- the semiconductor device 280 includes a unique code generation unit 281, a storage unit 282, a common key generation unit 283, a program execution unit 284, and a decryption unit 285.
- the unique code generation unit 281 generates a unique code UC(a) that is unique to the semiconductor device 280 and outputs it to the common key generation unit 283.
- the basic configuration and operation of the unique code generation unit 281 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 282 can store correction data CD(a), a public key PK(a) and a secret key SK(a) of the semiconductor device 280, and a common key CK(a) generated in the common key generation unit 283.
- the storage unit 282 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(a), the public key PK(a) and the secret key SK(a) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 282 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 280 is powered off.
- the common key generation unit 283 generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 281 and correction data CD(a) stored in the storage unit 282.
- the common key generation unit 283 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 283 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the program execution unit 284 executes the correction data generation program PRG(z) transmitted from the semiconductor device 290.
- the correction data CD(z) can be generated using the unique code UC(z) of the semiconductor device 290 and the common key CK(a).
- the program execution unit 284 is typically a processor such as a CPU.
- the correction data generation program PRG(z) may be a program that can run only on the semiconductor device 280, for example.
- the correction data generation program PRG(z) may be a program such as JAVA (registered trademark) that does not depend on the architecture of a semiconductor device on which it runs.
- Some semiconductor devices constituting the cryptographic communication system have different CPU core architectures. Thus, by using a program such as JAVA that is not dependent on the architecture of a semiconductor device on which it runs, it is possible to improve the convenience of the cryptographic communication system and reduce the cost of the cryptographic communication system.
- the decryption unit 285 decrypts the unique code UC(z)_c encrypted by an encryption unit 294 of the semiconductor device 290 using the secret key SK(a) of the semiconductor device 280 and thereby generates the unique code UC(z).
- the semiconductor device 290 includes a unique code generation unit 291, a storage unit 292, a common key generation unit 293, and an encryption unit 249.
- the unique code generation unit 291 generates a unique code UC(z) unique to the semiconductor device 290 and outputs it to the encryption unit 294 and the common key generation unit 293.
- the basic configuration and operation of the unique code generation unit 291 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 292 can have the common key CK(a) generated in the common key generation unit 293 and the correction data generation program PRG(z).
- the storage unit 292 includes a volatile memory and a nonvolatile memory, for example, and the correction data generation program PRG(z) is stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory.
- the storage unit 292 temporarily stores the common key CK(a), information of the common key CK(a) is erased when the semiconductor device 290 is powered off.
- the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 290 may be done on the common key CK(a) stored in the nonvolatile memory.
- the common key generation unit 293 generates the common key CK(a) using the unique code UC(z) output from the unique code generation unit 291 and the correction data CD(z) output from the program execution unit 284.
- the common key generation unit 293 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 293 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the encryption unit 294 encrypts the unique code UC(z) and the correction data generation program PRG(z) by using the public key PK(a) of the semiconductor device 280.
- the public key PK(a) to be used for encryption may be transmitted from the semiconductor device 280 to the semiconductor device 290 in advance and stored in the storage unit 292.
- the public key PK(a) to be used for encryption may be directly supplied from the semiconductor device 280 to the encryption unit 294 at the time when the encryption unit 294 encrypts the unique code UC(z) and the correction data generation program PRG(z).
- the encrypted unique code UC(z)_c and correction data generation program PRG(z) are output to the decryption unit 285 of the semiconductor device 280.
- the common key generation unit 283 of the semiconductor device ICa (280) generates the common key CK(a) using the unique code UC(a) output from the unique code generation unit 281 and the correction data CD(a) stored in the storage unit 282 (Step S160). Then, the semiconductor device ICa (280) starts communication with other semiconductor devices ICb to ICy (not shown) using the common key CK(a) (Step S161).
- the semiconductor device ICz (290) makes a request for transmission of the correction data CD(z) to the semiconductor device ICa (280) (Step S162).
- the semiconductor device 280 receives the request for transmission of the correction data CD(z), the semiconductor device 280 transmits the public key PK(a) of the semiconductor device 280 to the semiconductor device 290 (Step S163).
- the encryption unit 294 of the semiconductor device 290 encrypts the unique code UC(z) and the correction data generation program PRG(z) using the public key PK(a) of the semiconductor device 280 (Step S164).Note that the public key PK(a) of the semiconductor device 280 may be prestored in the storage unit 292 of the semiconductor device 290. In this case, Steps S162 and S163 can be skipped.
- the semiconductor device 290 transmits the encrypted unique code UC(z)_c and correction data generation program PRG(z)_c to the decryption unit 285 of the semiconductor device 280 (Step 5165).
- the decryption unit 285 of the semiconductor device 280 decrypts the encrypted unique code UC(z)_c and correction data generation program PRG(z)_c by using the secret key SK(a) of the semiconductor device 280 and thereby generates the unique code UC(z) and the correction data generation program PRG(z) (Step S166).
- the program execution unit 284 of the semiconductor device 280 executes the correction data generation program PRG(z) decrypted in the decryption unit 285.
- the correction data CD(z) can be generated using the unique code UC(z) of the semiconductor device 290 and the common key CK(a) (Step S167).
- the correction data generation program PRG(z) For the correction data generation program PRG(z) to generate the correction data C17(z), it is necessary to acquire the unique code UC(z) a plurality of times.
- Steps S164 to S166 (excluding transmission of the correction data generation program PRG(z)) are repeated to acquire the unique code UC(z) a plurality of times.
- the correction data generation program PRG(z) may be deleted after the correction data CD(z) is generated.
- the generated correction data CD(z) is transmitted to the common key generation unit 293 of the semiconductor device 290 (Step S168).
- the common key generation unit 293 of the semiconductor device 290 generates the common key CK(a) using the unique code UC(z) output from the unique code generation unit 291 and the correction data CD(z) output from the program execution unit 284 (Step S169).
- the added semiconductor device 290 can have the common key CK(a).
- the added semiconductor device (ICz) 290 becomes able to perform cryptographic communication with the semiconductor device (ICa) 280 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S170).
- the program execution unit 284 of the semiconductor device 280 generates the correction data CD(z) using the unique code UC(z) unique to the semiconductor device 290 and the common key CK(a), and the common key generation unit 293 of the semiconductor device 290 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of the semiconductor device 290.
- the correction data CD(a) used to generate the common key CK(a) in the semiconductor device 280 and the secret key SK(a) of the semiconductor device 280 are information with a relatively high security level, though the security level is lower than that of the common key CK(a).
- the security microcomputer may be used for the semiconductor device 280 in which the correction data CD(a) and the secret key SK(a) are stored in order to prevent leakage of the correction data CD(a) and the secret key SK(a) to a third party.
- the correction data CD(z) that is transmitted from the semiconductor device 280 to the semiconductor device 290 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a).
- the correction data CD(z) may be encrypted before transmission using the public key cryptosystem.
- the encryption unit 294 is included in the semiconductor device 290 and the decryption unit 285 is included in the semiconductor device 280 in order to transmit the unique code UC(z) and the correction data generation program PRG(z) after encryption.
- the encryption unit 294 and the decryption unit. 285 may be omitted, and the unique code UC(z) and the correction data generation program PRG(z) may be transmitted without encryption as in the eighth embodiment.
- correction data generation program PRG(z) is transmitted to the semiconductor device 280 from the semiconductor device 290 to be added.
- the correction data generation program PRG(z) may be transmitted to the semiconductor device 280 from a server, for example.
- the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- the unique code UC(z) can be generated by storing the correction data generation program PRG(z) into the semiconductor device 290 to be added and executing the correction data generation program PRG(z) in the semiconductor device 280.
- the correction data generation program PRG(z) may be stored before shipping of the semiconductor device 290 or may be downloaded from a server after shipping according to need. Further, if the correction data generation program PRG(z) is a program such as JAVA that is not dependent on the architecture of a semiconductor device on which it runs, it is possible to improve the convenience of the cryptographic communication system and reduce the cost of the cryptographic communication system.
- FIG. 30 is a block diagram showing a cryptographic communication system 205 according to this embodiment.
- a plurality of common keys CK(1) and CK(2) are generated in a common key generation unit 303 of a semiconductor device ICa (300).
- the semiconductor device ICa (300) and a semiconductor device ICz (310) communicate using the common key CK(2), and the semiconductor device ICa (300) and semiconductor devices ICb to ICy communicate using the common key CK(1).
- the semiconductor device ICa (300) functions as a router.
- the cryptographic communication system 205 shown in Fig. 30 includes the semiconductor device ICa (300) and the semiconductor device ICz (310).
- the semiconductor device 300 includes a unique code generation unit 301, a storage unit 302, a common key generation unit 303, and a correction data generation unit 304.
- the unique code generation unit 301 generates a unique code UC(a) unique to the semiconductor device 300 and outputs it to the common key generation unit 303.
- the basic configuration and operation of the unique code generation unit 301 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 302 can store correction data CD(1) and CD(2) and common keys CK(1) and CK(2) generated in the common key generation unit 303.
- the storage unit 302 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(1) and CD(2) are stored in the nonvolatile memory, and the common keys CK(1) and CK(2) are stored in the volatile memory.
- the storage unit 302 temporarily stores the common keys CK(1) and CK(2), information of the common keys CK(1) and CK(2) is erased when the semiconductor device 300 is powered off.
- the common keys CK(1) and CK(2) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 300 may be done on the common keys CK(1) and CK(2) stored in the nonvolatile memory.
- the common key generation unit 303 generates the common key (second common key) CK(1) using the unique code UC(a) output from the unique code generation unit 301 and correction data (third correction data) CD(1) stored in the storage unit 302. Further, the common key generation unit 303 generates the common key (first common key) CK(2) using the unique code UC(a) output from the unique code generation unit 301 and correction data (first correction data) CD(2) stored in the storage unit 302.
- the common key generation unit 303 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 303 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the correction data generation unit 304 generates correction data (second correction data) CD(z) using the unique code UC(z) of the semiconductor device 310 and the common key CK(2).
- the basic configuration and operation of the correction data generation unit 304 are the same as those of the correction data generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted.
- the semiconductor device 310 includes a unique code generation unit 311, a storage unit 312, and a common key generation unit 313.
- the unique code generation unit 311 generates a unique code UC(a) unique to the semiconductor device 310 and outputs it to the correction data generation unit 304 of the semiconductor device 300.
- the basic configuration and operation of the unique code generation unit 311 are the same as those of the unique code generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted.
- the storage unit 312 can have the common key CK(2) generated in the common key generation unit 313.
- the storage unit 312 stores the common key CK(2) in a volatile memory.
- the storage unit 312 temporarily stores the common key CK(2), information of the common key CK(2) is erased when the semiconductor device 310 is powered off.
- the common key CK(2) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of the semiconductor device 310 may be done on the common key CK(2) stored in the nonvolatile memory.
- the common key generation unit 313 generates the common key CK(2) using the unique code UC(z) output from the unique code generation unit 311 and the correction data CD(z) output from the correction data generation unit 304.
- the common key generation unit 313 functions as a unique code correction unit.
- the basic configuration and operation of the common key generation unit 313 are the same as those of the common key generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted.
- the common key generation unit 303 of the semiconductor device ICa (300) generates the common key CK(1) using the unique code UC(a) output from the unique code generation unit 301 and the correction data CD(1) stored in the storage unit 302 (Step S171). Then, the semiconductor device ICa (300) starts communication with other semiconductor devices ICb to ICy (third semiconductor device) using the common key CK(1) (Step S172).
- the semiconductor device 310 transmits the unique code UC(z) of the semiconductor device 310 to the correction data generation unit 304 of the semiconductor device 300 (Step S173).
- the common key generation unit 303 of the semiconductor device 300 generates the common key CK(2) using the unique code UC(a) output from the unique code generation unit 301 and the correction data CD(2) stored in the storage unit 302 (Step S174).
- the correction data generation unit 304 of the semiconductor device 300 generates the correction data CD(z) using the unique code UC(z) of the semiconductor device 310 and the common key CK(2) (Step S175).
- the correction data generation unit 304 it is necessary to acquire the unique code UC(z) a plurality of times.
- Step S173 is repeated to acquire the unique code UC(z) a plurality of times.
- the generated correction data CD(z) is transmitted to the common key generation unit 313 of the semiconductor device 310 (Step S176).
- the common key generation unit 313 of the semiconductor device 310 generates the common key CK(2) using the unique code UC(z) output from the unique code generation unit 311 and the correction data CD(z) output from the correction data generation unit 304 (Step S177).
- both of the semiconductor device 300 and the semiconductor device 310 can have the common key CK(2).
- the added semiconductor device 310 becomes able to perform cryptographic communication with the semiconductor device 300 using the common key CK(2) (Step S178).
- Fig. 32 is a block diagram showing an example of a configuration of the cryptographic communication system according to this embodiment.
- the semiconductor device ICa and the semiconductor devices ICb and ICc communicate using the common key CK(1) and establish a secure network.
- the added semiconductor device ICz communicates with the semiconductor device ICa using the common key CK(2).
- the semiconductor device ICa functions as a router, so that the added semiconductor device ICz can perform cryptographic communication with the semiconductor devices ICb and ICc through the semiconductor device ICa.
- the correction data generation unit 304 of the semiconductor device 400 generates the correction data CD(z) using the unique code UC(z) unique to the semiconductor device 310 and the common key CK(2)
- the common key generation unit 313 of the semiconductor device 310 generates the common key CK(2) using the correction data CD(z) and the unique code UC(z) of the semiconductor device 310.
- the correction data CD(1) and CD(2) used to generate the common keys CK(1) and CK(2) are information with a relatively high security level, though the security level is lower than that of the common keys CK(1) and CK(2).
- the security microcomputer may be used for the semiconductor device 300 in which the correction data CD(1) and CD(2) are stored in order to prevent leakage of the correction data CD(1) and CD(2) to a third party.
- the correction data CD(z) that is transmitted from the semiconductor device 300 to the semiconductor device 310 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(2).
- the correction data CD(z) may be encrypted before transmission using the public key cryptosystem.
- the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- Fig. 33 is a block diagram showing a case where the cryptographic communication system according to the eighth to twelfth embodiment is applied to a vehicle-mounted semiconductor device.
- a vehicle 360 includes a gateway unit 350, a fault diagnostic unit 351, an engine control unit 352, a brake control unit 353, a lamp control unit 354, a door lock control unit 355, and a key insertion control unit 356.
- the gateway unit 350 is equipment for relaying a network composed of the units 351 to 356.
- a secure microcomputer ICa is included in the gateway unit 350.
- the fault diagnostic unit 351 is a unit for making a diagnosis whether the components of the vehicle 360 are at fault.
- a semiconductor device ICb is included in the fault diagnostic unit 351.
- the engine control unit 352 is a unit for making electrical control (fuel supply, ignition timing control etc.) of engine operation in a comprehensive manner.
- a semiconductor device ICc is included in the engine control unit 352.
- the brake control unit 353 is a unit for controlling a brake such as ABS (Antilock Brake System).
- a semiconductor device ICd is included in the brake control unit 353.
- the lamp control unit 354 is a unit for controlling a headlight, winker and the like of the vehicle.
- a semiconductor device ICe is included in the lamp control unit 354.
- the door lock control unit 355 is a unit for controlling door lock.
- a semiconductor device ICf and a communication unit for radio communication with a key 357 are included in the door lock control unit 355.
- the key insertion control unit 356 is a unit for determining whether the inserted key is a valid user key or not.
- a semiconductor device ICg and a communication unit for radio communication with the key 357 are included in the key insertion control unit 356.
- a semiconductor device ICh and a communication unit are included in the key 357.
- General-purpose microcomputers for example, may be used for the semiconductor devices ICb to ICh that are included in the respective units 351 to 356 and the key 357.
- the fault diagnostic unit 351, the engine control unit 352, the brake control unit 353, the lamp control unit 354, the door lock control unit 355 and the key insertion control unit 356 are connected to the gateway unit 350, and the respective units 351 to 356 are configured to be able to communicate with one another through the gateway unit 350.
- the common key that is used for communication between the respective units 351 to 356 and the gateway unit 350 may differ from unit to unit. For example, a common key A may be used for communication between the fault diagnostic unit 351 and the gateway unit 350, and a common key B may be used for communication between the engine control unit 352 and the gateway unit 350.
- the gateway unit (ICa) 350 and the respective units (ICb to ICg) 351 to 356 establish a secure network.
- ICa car navigation system
- ICz car navigation system
- the configuration in which the units 351 to 356 and the car navigation system 358 perform communication through the gateway unit 350 is shown.
- the units 351 to 356 and the car navigation system 358 may communicate with one another using the same common key.
- the units 351 to 356 and the car navigation system 358 are configured to be connected to one another through a common bus, for example. It is further applicable to communication between various units different from the units shown in Fig. 33 .
- the cryptographic communication system according to the first to sixth embodiments and the eighth to twelfth embodiments is applied to a vehicle-mounted semiconductor device is described in this embodiment.
- the cryptographic communication system according to the first to sixth embodiments and the eighth to twelfth embodiments may be applied also to a typical LAN, smart meter, smart grid, contactless IC card and the like, not limited to a vehicle-mounted semiconductor device.
- the semiconductor devices that constitute the cryptographic communication system may communicate with one another via wired or wireless connections.
- the first to thirteenth embodiments can be combined as desirable by one of ordinary skill in the art.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Semiconductor Integrated Circuits (AREA)
Abstract
Description
- This application is based upon and claims the benefit of priority from Japanese Patent Applications Nos.
2011-136131 filed on June 20, 2011 2011-136132 filed on June 20, 2011 2012-076387 filed on March 29, 2012 - The present invention relates to a cryptographic communication system and a cryptographic communication method and, particularly, to a cryptographic communication system and a cryptographic communication method that enhance security.
- In a communication system, communication data is encrypted to prevent wiretapping, falsification and the like of the communication data. One of techniques for the encryption is common key cryptosystem in which both ends of communication use a common encryption key (which is referred to hereinafter as a common key). In the common key cryptosystem, it is necessary for both ends of communication to share the common key without a third party knowing. One of techniques to achieve that is public key cryptosystem using RSA (registered trademark), elliptic curve cryptography and the like.
- A technique to provide an integrated circuit that can prevent use of an illegally copied IC is disclosed in Japanese Unexamined Patent Application Publication No
2010-226603 PCT Application) No. 2010-52721 - Further, a technique to reduce time for key exchange in a communication system to perform cryptographic communication using a common encryption key through a local area network is disclosed in Japanese Unexamined Patent Application Publication No.
2005-341528 2002-26899 - For example, in the case of performing cryptographic communication using a common key CK(x) between a semiconductor device ICx and a semiconductor device ICy, the common key CK(x) needs to be shared between ICx and ICy. When ICx has the common key CK(x), ICx encrypts the common key CK(x) using a public key PK(y) of ICy acquired in advance and transmits the encrypted common key CK(x)` to ICy. Then, ICy decrypts the encrypted common key CK(x)' using a secret key SK(y) of ICy and thereby acquires the common key CK(x). In this manner, by transmitting the common key CK(x) from ICx to ICy using the public key cryptosystem, it is possible to share the common key CK(x) between ICx and ICy without a third party knowing. Thus, cryptographic communication can be performed between ICx and ICy using the common key cryptosystem.
- At the time of transmitting the common key CK(x) from ICx to ICy, information of the common key CK(x) is not leaked to a third party because the common key CK(x) is encrypted. However, because important data such as the common key CK(x) and the secret key SK(y) are stored in a nonvolatile memory of the semiconductor devices (semiconductor chips) ICx and ICy. Therefore, if unauthorized analysis of the semiconductor device is made, leakage of the important data such as the common key CK(x) and the secret key SK(y) occurs.
- Further, in the case of adding a semiconductor device ICz to the cryptographic communication system in which secure communication is established such as the semiconductor device ICx and the semiconductor device ICy described above, it is necessary to verify whether the semiconductor device ICz to be added is a proper semiconductor device. However, in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, it is necessary to incorporate an expensive secure server, for example, into the cryptographic communication system. This causes an increase in costs of the cryptographic communication system.
- A cryptographic communication system according to an aspect of the present invention includes a first semiconductor device and a second semiconductor device. The first semiconductor device generates a common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and first correction data for correcting the first unique code, encrypts the common key by using a public key, and transmits the encrypted common key to the second semiconductor device. The second semiconductor device generates a secret key of the second semiconductor device by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor device and second correction data for correcting the second unique code, and decrypts the encrypted common key transmitted from the first semiconductor device by using the secret key. By this operation, the first semiconductor device and the second semiconductor device have the same common key, thus achieving highly secure communication with the common key.
- A cryptographic communication system according to an aspect of the present invention includes a first semiconductor device and a second semiconductor device. The first semiconductor device generates a secret key of the first semiconductor device by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and first correction data for correcting the first unique code, generates signature data by using the secret key and a plain text, and transmits the signature data to the second semiconductor device. The second semiconductor device generates verification data by using the transmitted signature data and a public key of the first semiconductor device and compares the verification data with the plain text to determine whether the first semiconductor device has a secret key. By this operation, the first semiconductor device does not need to directly store the secret key, which is important data, thereby improving security for digital signature between the first semiconductor device and the second semiconductor device.
- In the above aspect, the public key of the first semiconductor device may be generated using a second unique code that is a unique code arising from process variation or the like of the second semiconductor device and second correction data for correcting the second unique code.
- A cryptographic communication system according to an aspect of the present invention includes first to third semiconductor devices. The third semiconductor device supplies first correction data for correcting a first unique code to the first semiconductor device, and the first semiconductor device generates a common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and the first correction data supplied from the third semiconductor device. Further, the third semiconductor device supplies second correction data for correcting a second unique code to the second semiconductor device, and the second semiconductor device generates a common key by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor device and the second correction data supplied from the third semiconductor device. By this operation, the first semiconductor device and the second semiconductor device have the same common key, thus achieving highly secure communication with the common key.
- In the above aspect, the third semiconductor device may include a database that stores correction data associated with respective semiconductor devices and commons keys generated in the respective semiconductor device.
- Further, the third semiconductor device may generate the first correction data by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and a common key, and generate the second correction data by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor and the common key.
- Further, the third semiconductor device may generate the first correction data by using a first unique code first unique code that is a unique code arising from process variation or the like of the first semiconductor device and a first common key, and generate the second correction data by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor and a second common key. In this case, the first semiconductor device may have the first common key, the second semiconductor device may have the second common key, and the third semiconductor device may have the first and second common keys. Thus, the first semiconductor device and the third semiconductor device can communicate using the first common key, the second semiconductor device and the third semiconductor device can communicate using the second common key, and the first semiconductor device and the second semiconductor device can communicate through the third semiconductor device.
- A cryptographic communication system according to an aspect of the present invention includes a first semiconductor device and a second semiconductor device. The first semiconductor device generates a first common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and first correction data for correcting the first unique code. Further, the first semiconductor device generates second correction data for correcting a second unique code by using a second unique code that is a unique code arising from process variation or the like of the second semiconductor and the first common key, and transmits the generated second correction data to the second semiconductor device. The second semiconductor device generates a first common key by using the second correction data generated in the first semiconductor device and the second unique code. By this operation, the first semiconductor device and the second semiconductor device have the same common key. Thus, the first semiconductor device and the second semiconductor device can perform highly secure communication using the first common key.
- In the above aspect, the second semiconductor device may encrypt the second unique code by using a public key of the first semiconductor device and transmit the encrypted second unique code to the first semiconductor device, and the first semiconductor device may decrypt the encrypted second unique code by using a secret key of the first semiconductor device.
- Further, a cryptographic communication system according to an aspect of the present invention may include a server including a database that stores public keys of respective semiconductor devices in association with the respective semiconductor devices. The second semiconductor device then generates signature data by using a secret key of the second semiconductor device and a plain text, and transmits the signature data to the first semiconductor device. The first semiconductor device generates verification data by using a public key of the second semiconductor device transmitted from the server and the signature data transmitted from the second semiconductor device and compares the verification data with the plain text to determine whether the second semiconductor device has a secret key.
- Further, the second semiconductor device may encrypt a correction data generation program for generating second correction data using the first common key and the second unique code by using the public key of the first semiconductor device and transmit the encrypted correction data generation program to the first semiconductor device. The first semiconductor device decrypts the encrypted correction data generation program and executes the decrypted correction data generation program and thereby generates the second correction data by using the first common key and the second unique code.
- Further, the first common key generation unit may generate a second common key by using a first unique code that is a unique code arising from process variation or the like of the first semiconductor device and third correction data for correcting the first unique code. The first semiconductor device can thereby communicate with the second semiconductor device using the first common key and communicate with the third semiconductor device using the second common key, and the second semiconductor device can communicate with the third semiconductor device through the first semiconductor device.
- Further, a cryptographic communication system according to an aspect of the present invention may be applied to a vehicle-mounted semiconductor device.
- According to the aspects of the present invention, it is possible to provide a cryptographic communication system and a cryptographic communication method that enhance security. Further, according to the aspects of the present invention, it is possible to provide a cryptographic communication system and a cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- The above and other aspects, advantages and features will be more apparent from the following description of certain embodiments taken in conjunction with the accompanying drawings, in which:
-
Fig. 1 is a block diagram showing a cryptographic communication system according to a first embodiment; -
Fig. 2 is a flowchart to explain an operation of the cryptographic communication system according to the first embodiment; -
Fig. 3 is a flowchart to explain an operation of a common key generation unit; -
Fig. 4 is a table showing an example of a unique code processed in the common key generation unit; -
Fig. 5 is a block diagram showing a cryptographic communication system according to a second embodiment; -
Fig. 6 is a flowchart to explain an operation of the cryptographic communication system according to the second embodiment; -
Fig. 7 is a block diagram showing a cryptographic communication system according to a third embodiment; -
Fig. 8 is a flowchart to explain an operation of the cryptographic communication system according to the third embodiment; -
Fig. 9 is a block diagram showing a cryptographic communication system according to a fourth embodiment; -
Fig. 10 is a table showing an example of data stored in a database of the cryptographic communication system according to the fourth embodiment; -
Fig. 11 is a flowchart to explain an operation of the cryptographic communication system according to the fourth embodiment; -
Fig. 12 is a block diagram showing a cryptographic communication system according to a fifth embodiment; -
Fig. 13 is a flowchart to explain an operation of the cryptographic communication system according to the fifth embodiment; -
Fig. 14 is a flowchart to explain an operation of a correction data generation unit; -
Fig. 15 is a block diagram showing a cryptographic communication system according to a sixth embodiment; -
Fig. 16 is a flowchart to explain an operation of the cryptographic communication system according to the sixth embodiment; -
Fig. 17 is a block diagram showing a case where the cryptographic communication system according to the first to sixth embodiment is applied to a vehicle-mounted semiconductor device; -
Fig. 18 is a block diagram showing a cryptographic communication system according to an eighth embodiment; -
Fig. 19 is a flowchart to explain an operation of the cryptographic communication system according to the eighth embodiment; -
Fig. 20 is a flowchart to explain an operation of a common key generation unit; -
Fig. 21 is a table showing an example of a unique code processed in the common key generation unit; -
Fig. 22 is a flowchart to explain an operation of a correction data generation unit; -
Fig. 23 is a diagram showing a case where correction data is generated using a plurality of semiconductor devices; -
Fig. 24 is a block diagram showing a cryptographic communication system according to a ninth embodiment; -
Fig. 25 is a flowchart to explain an operation of the cryptographic communication system according to the ninth embodiment; -
Fig. 26 is a block diagram showing a cryptographic communication system according to a tenth embodiment; -
Fig. 27 is a flowchart to explain an operation of the cryptographic communication system according to the tenth embodiment; -
Fig. 28 is a block diagram showing a cryptographic communication system according to an eleventh embodiment; -
Fig. 29 is a flowchart to explain an operation of the cryptographic communication system according to the eleventh embodiment; -
Fig. 30 is a block diagram showing a cryptographic communication system according to a twelfth embodiment; -
Fig. 31 is a flowchart to explain an operation of the cryptographic communication system according to the twelfth embodiment; -
Fig. 32 is a block diagram showing a configuration of the cryptographic communication system according to the twelfth embodiment; and -
Fig. 33 is a block diagram showing a case where the cryptographic communication system according to the eighth to twelfth embodiment is applied to a vehicle-mounted semiconductor device. - Embodiments of the present invention are described hereinafter with reference to the drawings.
-
Fig. 1 is a block diagram showing a cryptographic communication system according to a first embodiment. Thecryptographic communication system 1 according to this embodiment includes a semiconductor device ICa (first semiconductor device) 10 and a semiconductor device ICb (second semiconductor device) 20. Thesemiconductor device 10 includes a uniquecode generation unit 11, astorage unit 12, a commonkey generation unit 13, and anencryption unit 14. - The unique
code generation unit 11 generates a unique code (first unique code) UC(a) having a value unique to thesemiconductor device 10 and containing a random error and outputs it to the commonkey generation unit 13. The unique code UC(a) is a value determined by physical properties inherent to an element included in thesemiconductor device 10. For example, the uniquecode generation unit 11 may generate the unique code UC(a) using a value at startup of a memory element included in thesemiconductor device 10. The unique code is a code generated using the property that actually fabricated ICs vary despite that the design of the ICs is the same. This technique is called PUF (Physical Unclonable Function), and it is a technique that, even when a plurality of ICs having the same circuit are fabricated at a time on one semiconductor wafer by the same fabrication device, generates unique codes for the respective ICs and further makes the ICs unclonable. Use of this technique achieves effective concealment of data without a need for special hardware such as a tamper-resistant chip. - The
storage unit 12 can store correction data (first correction data) CD(a), a common key CK(a) generated in the commonkey generation unit 13, and a public key PK(b) of thesemiconductor device 20. Thestorage unit 12 includes a volatile memory (for example, SRAM) and a nonvolatile memory (for example, flash memory), for example, and the correction data CD(a) and the public key PK(b) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 12 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 10 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 10 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 13 generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 11 and the correction data CD(a) stored in thestorage unit 12. - The unique code UC(a) generated in the unique
code generation unit 11 is data containing bit values that vary depending on external factors during generation of the unique code, such as temperature and voltage, for example. Therefore, the unique code UC(a) generated in the uniquecode generation unit 11 contains three types of bits: (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). In this manner, the unique code UC(a) generated in the uniquecode generation unit 11 contains (2) bits with high variability and (3) bits with low variability. Accordingly, the unique code UC(a) has different values each time generated. - The bit with high variability can be found in the fabrication process. Thus, by making each bit decision during the fabrication process, mask data to mask the bit with high variability can be created. By masking the unique code UC(a) generated in the unique
code generation unit 11 using the mask data, the bit with high variability contained in the unique code UC(a) can be eliminated. Because the position of the bit with high variability differs from device to device, the mask data is data unique to the semiconductor device. - On the other hand, the bit with low variability varies due to external factors, remaining charges and the like, and it is thus difficult to make estimation. Therefore, the bit with low variability is processed using an ECC code, such as BCH code or Reed-Solomon code, generated during fabrication. An operation of the common
key generation unit 13 is specifically described hereinafter. -
Fig. 3 is a flowchart to explain an operation of the commonkey generation unit 13, andFig. 4 is a table showing an example of a unique code processed in the commonkey generation unit 13. First, the commonkey generation unit 13 reads the unique code UG(a) from the unique code generation unit 11 (Step S11). The unique code UC(a) read in this step is a unique code on which error correction for eliminating a bit with a variable value is not made. - Next, the common
key generation unit 13 masks the read unique code UC(a) using the mask data contained in the correction data CD(a) (Step S12). The mask data is data for masking a bit with a high error rate having a variable bit value among the bits of the unique code UC(a). In the example shown inFig. 4 , because the error rate of the first bit and the sixth bit of the unique code UC(a) is high, the mask data is "0". Because the other bits are bits with a low error rate or bits with a stable value, the mask data is "1". In other words, the mask data for the bit that needs to be masked is "0", and the mask data for the bit that does not need to be masked is "1". By masking the unique code UC(a) using the mask data, masked unique code UC(a)' in which the first bit and the sixth bit of the unique code UC(a) are eliminated can be obtained (the bits eliminated by masking are indicated by "X"). After that, the masked unique code UC(a) is left-justified. - Then, using the ECC code (error correction code) contained in the correction data CD(a), the common
key generation unit 13 makes a correction to remove the error of the bit with a low degree of variability contained in the masked unique code UC(a)', thereby obtaining a unique code UC(a)" (Step S13). In the example shown inFig. 4 , as a result that the masked unique code UC(a)' is processed using the ECC code, the first bit is corrected from "0" to "1". - Then, the common
key generation unit 13 performs a specified operation on the error-corrected unique code UC(a)" using an operation parameter contained in the correction data CD(a) (Step S14). In the example shown inFig. 4 , NOT operation is performed on the error-corrected unique code UC(a)". The unique code UC(a) after this operation is the common key CK(a). Note that the NOT operation is just one example, and any operation may be performed on the error-corrected unique code UC(a)". By changing the operation parameter, it is possible to change the common key CK(a) according to need. Further, by performing a specified operation on the error-corrected unique code UC(a)" using the operation parameter, the common key CK(a) can be generated as a code that is not apparently similar to the unique code UC(a). This further enhances the security level. Furthermore, the operation performed on the error-corrected unique code UC(a)" may be skipped. In this case, the unique code UC(a)" processed using the mask data and the ECC code serves as the common key CK(a). The common key CK(a) generated in this manner is output to thestorage unit 12 and theencryption unit 14. - Note that the mask code, the ECC code and the operation parameter contained in the correction data CD(a) are generated in advance as unique data of the
semiconductor device 10 and stored in thestorage unit 12. A method of generating the correction data CD(a) is described later (cf. fifth embodiment,Fig. 14 ). Further, in order to extract a bit with high variability contained in the unique code UC(a) read from the uniquecode generation unit 11, reading of the unique code UC(a) is performed a plurality of times and then the ECC code is generated on the basis of the masked unique code UC(a)'. - As described above, the common
key generation unit 13 has the function of generating the common key CK(a) and also has the function of correcting the unique code UC(a) using the correction data CD(a). A secretkey generation unit 23 shown inFig. 1 , a secretkey generation unit 33 shown inFig. 5 , a secretkey generation unit 53 and a publickey generation unit 63 shown inFig. 7 , commonkey generation units Fig. 9 , commonkey generation units Fig. 12 , and commonkey generation units Fig. 15 also function as a unique code correction unit that corrects the unique code UC using the correction data CD. Note that, although the key generation unit is referred to as a common key generation unit, a secret key generation unit or a public key generation unit according to the key to be generated in this specification for the sake of convenience, the configuration and operation of those units are basically the same. - The common key CK(a) is a single-use (one-time) key or a fixed key according to usage. For example, when the common key CK(a) is a fixed key for storing encrypted data in the nonvolatile memory, the correction data CD(a) is determined so as to obtain a bit pattern as the common key CK(a) from a bit pattern obtained as the unique code UC(a) of the
semiconductor device 10, and therefore a plurality of correction data CD(a) can be easily generated. On the other hand, when the common key CK(a) is a single-use key to be used for each communication session between ICa and ICb, the correction data CD(a) is determined so as to obtain different bit patterns for a plurality of different correction data CD(a). - The
encryption unit 14 inFig. 1 encrypts the common key CK(a) generated in the commonkey generation unit 13 by using a public key PK(b) of thesemiconductor device 20. The public key PK(b) to be used for encryption may be transmitted from thesemiconductor device 20 to thesemiconductor device 10 in advance and stored in thestorage unit 12. Alternatively, the public key PK(b) to be used for encryption may be directly supplied from thesemiconductor device 20 to theencryption unit 14 at the time when theencryption unit 14 encrypts the common key CK(a). - The
semiconductor device 20 includes a uniquecode generation unit 21, astorage unit 22, a secretkey generation unit 23, and adecryption unit 24. The uniquecode generation unit 21 generates a unique code (second unique code) UC(b) having a value unique to thesemiconductor device 20 and containing a random error and outputs it to the secretkey generation unit 23. The configuration and operation of the uniquecode generation unit 21 are basically the same as the uniquecode generation unit 11 described above. - The
storage unit 22 can store correction data (second correction data) CD(b), a public key PK(b), and a common key CK(a) decrypted by the decryption unit. Thestorage unit 22 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(b) and the public key PK(b) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 22 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 20 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 20 may be done on the common key CK(a) stored in the nonvolatile memory. - The secret
key generation unit 23 generates a secret key SK(b) of thesemiconductor device 20 using the unique code UC(b) and the correction data CD(b). Note that a method of generating the secret key SK(b) in the secretkey generation unit 23 is basically the same as the method of generating the common key CK(a) in the commonkey generation unit 13 described above. - The
decryption unit 24 decrypts the common key CK(a)" encrypted in theencryption unit 14 of thesemiconductor device 10 by using the secret key SK(b) and thereby generates the common key CK(a). - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 2 . First, the semiconductor device ICb (20) transmits the public key PK(b) of the semiconductor device ICb (20) to the semiconductor device ICa (10) (Step S1). The transmitted public key PK(b) is stored into thestorage unit 12 of thesemiconductor device 10. Next, the commonkey generation unit 13 of thesemiconductor device 10 generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 11 and the correction data CD(a) stored in the storage unit 12 (Step S2). Theencryption unit 14 encrypts the common key CK(a) generated in the commonkey generation unit 13 by using the public key PK(b) of thesemiconductor device 20 and thereby generates the encrypted common key CK(a)' (Step S3). Then, the encrypted common key CK(a)' is transmitted from thesemiconductor device 10 to the semiconductor device 20 (Step S4). - The secret
key generation unit 23 of thesemiconductor device 20 generates the secret key SK(b) of thesemiconductor device 20 using the unique code UC(b) and the correction data CD(b) (Step S5). Thedecryption unit 24 decrypts the encrypted common key CK(a)' by using the secret key SK(b) and thereby generates the common key CK(a) (Step S6). By the above process, both of thesemiconductor device 10 and thesemiconductor device 20 can have the common key CK(a). Thus, thesemiconductor device 10 and thesemiconductor device 20 can perform cryptographic communication using the common key CK(a) (Step S7). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. For example, Step S5 may be performed in thesemiconductor device 20 in parallel with Steps S2 and S3 performed in thesemiconductor device 10. - As described earlier, in the case of performing cryptographic communication using the common key CK(x) between the semiconductor device ICx and the semiconductor device ICy, the common key CK(x) needs to be shared between ICx and ICy. When ICx has the common key CK(x), ICx encrypts the common key CK(x) using the public key PK(y) of ICy acquired in advance and transmits the encrypted common key CK(x)' to ICy. Then, ICy decrypts the encrypted common key Ck(x)' using the secret key SK(y) of ICy and thereby acquires the common key CK(x). In this manner, by transmitting the common key CK(x) from ICx to ICy using the public key cryptosystem, it is possible to share the common key CK(x) between ICx and ICy without a third party knowing. Thus, cryptographic communication can be performed between ICx and ICy using the common key cryptosystem.
- At the time of transmitting the common key CK(x) from ICx to ICy, information of the common key CK(x) is not leaked because the common key CK(x) is encrypted. However, because important data such as the common key CK(x) and the secret key SK(y) are stored in the nonvolatile memory (storage unit) of the semiconductor devices (semiconductor chips) ICx and ICy. Therefore, if unauthorized analysis of the semiconductor device is made, leakage of the important data such as the common key CK(x) and the secret key SK(y) occurs.
- On the other hand, in the cryptographic communication system according to this embodiment, the common key CK(a) is generated in the common
key generation unit 13 of thesemiconductor device 10 by using the unique code UC(a) containing an information component unique to thesemiconductor device 10 and a variable information component, and the correction data CD(a) that corrects the unique code UC(a). Further, the secret key SK(b) of thesemiconductor device 20 is generated in the secretkey generation unit 23 of thesemiconductor device 20 by using the unique code UC(b) containing an information component unique to thesemiconductor device 20 and a variable information component, and the correction data CD(b) that corrects the unique code UC(b). Because important data such as the common key CK(a) and the secret key SK(b) are not directly stored in thestorage units - Further, although the secret key SK(b) needs to be a key corresponding to the public key PK(b), it is easy to generate a plurality of correction data CD(b) because the correction data CD(b) can be determined so as to obtain a bit pattern as the secret key SK(b) from a bit pattern obtained as the unique code UC(b) of the
semiconductor device 20. - Methods of analyzing a semiconductor device for unauthorized acquisition of data are as follows.
- (1) A method that makes modification to the semiconductor device using FIB (Focused Ion Beam) and physically analyzes the semiconductor device using a probe.
- (2) Fault tree analysis that makes a CPU run away by applying an electromagnetic wave such as a laser beam to the semiconductor device or inserting noise to a power supply terminal and thereby acquires data in an unauthorized manner.
- (3) Leakage analysis that observes the current consumption of the semiconductor device and analyzes key data.
- In order to avoid the unauthorized analysis, in the field where a high security level is required, a microcomputer with a high security level (which is referred to hereinafter as a secure microcomputer) is used. The secure microcomputer has a shield to protect a wiring area, a function of detecting light or signal noise, a function of disrupting the current by combining a random number signal with a signal and the like. In the unauthorized analysis of key data by the leakage analysis described above, a characteristic pattern of power consumption arising from execution of a certain operation based on specific data is extracted. The characteristic pattern of power consumption can be disrupted by making random selection from a plurality of correction data CD(a) or CD(b) using a random number or the like.
- In this manner, it is possible to prevent a third party's unauthorized analysis of the semiconductor device by using the secure microcomputer. However, in the case of using the secure microcomputer, although the unauthorized analysis can be prevented, semiconductor device manufacturers cannot carry out failure analysis and breakdown analysis because of its high tamper resistance. Particularly, in a vehicle-mounted microcomputer (ECU etc.) for automobile use, failure analysis and breakdown analysis of a semiconductor device are necessary because high reliability is required. For this reason, a general-purpose microcomputer having a lower security level than the secure microcomputer has been widely used as the vehicle-mounted microcomputer. Thus, a cryptographic communication system that increases the security level of a semiconductor device with use of a general-purpose microcomputer has been required for the vehicle-mounted microcomputer.
- In the cryptographic communication system according to this embodiment, because important data such as the common key CK(a) and the secret key SK(b) are not directly stored in the
storage units semiconductor device 10 and thesemiconductor device 20 are configured using a general-purpose microcomputer with a relatively low security level, a high security level can be achieved. - Note that the correction data CD(a) and CD(b) that are used to generate the common key CK(a) and the secret key SK(b) are information with a relatively high security level, though the security level is lower than that of the common key CK(a) and the secret key SK(b). Thus, the security microcomputer may be used for the
semiconductor devices - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that enhance security.
- A second embodiment of the present invention is described hereinafter.
Fig. 5 is a block diagram showing acryptographic communication system 2 according to this embodiment. In this embodiment, the cryptographic communication system is applied to a digital signature system. Thecryptographic communication system 2 according to this embodiment includes a semiconductor device ICa (30) and a semiconductor device ICb (40). Thesemiconductor device 30 includes a uniquecode generation unit 31, astorage unit 32, a secretkey generation unit 33, and a signaturedata generation unit 34. - The unique
code generation unit 31 generates a unique code UC(a) that is unique to thesemiconductor device 30 and outputs it to the secretkey generation unit 33. The basic configuration and operation of the uniquecode generation unit 31 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 32 can store correction data CD(a), plain text Plane(a), and a public key PK(a) of thesemiconductor device 30 in a nonvolatile memory. - The secret
key generation unit 33 generates a secret key SK(a) of thesemiconductor device 30 using the unique code UC(a) output from the uniquecode generation unit 31 and the correction data CD(a) stored in thestorage unit 32. Note that the secretkey generation unit 33 functions as a unique code correction unit. The basic configuration and operation of the secretkey generation unit 33 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The signature
data generation unit 34 generates signature data Sig(a) using the secret key SK(a) generated in the secretkey generation unit 33 and the plain text Plane(a) stored in thestorage unit 32. In other words, the signaturedata generation unit 34 executes a signature generation algorithm in the digital signature scheme. - The
semiconductor device 40 includes astorage unit 41 and averification unit 42. Thestorage unit 41 can store the public key PK(a) of thesemiconductor device 30. Theverification unit 42 executes a verification algorithm in the digital signature scheme. Specifically, theverification unit 42 generates verification data using the signature data Sig(a) and the public key PK(a) of thesemiconductor device 30. The signature data Sig(a) is data generated by encrypting the plain text Plane(a) using the secret key SK(a) of thesemiconductor device 30. Thus, the verification data obtained by decrypting the signature data Sig(a) using the public key PK(a) of thesemiconductor device 30 is data corresponding to the plain text Plane(a) transmitted from thesemiconductor device 30. Therefore, theverification unit 42 compares the verification data with the plain text Plane(a) and, when the verification data and the plain text Plane(a) match, it can be determined that thesemiconductor device 30 has the secret key SK(a). Note that the public key PK(a) supplied from thesemiconductor device 30 may be directly supplied to theverification unit 42 of thesemiconductor device 40. - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 6 . First, the semiconductor device 30 (which corresponds to a signer) transmits the public key PK(a) of thesemiconductor device 30 to the semiconductor device 40 (which corresponds to a verifier) (Step S21). - Then, the secret
key generation unit 33 of thesemiconductor device 30 generates the secret key SK(a) of thesemiconductor device 30 using the unique code UC(a) output from the uniquecode generation unit 31 and the correction data CD(a) stored in the storage unit 32 (Step S22). After that, the signaturedata generation unit 34 of thesemiconductor device 30 executes a signature generation algorithm in the digital signature scheme. Specifically, the signaturedata generation unit 34 generates the signature data Sig(a) using the secret key SK(a) generated in the secretkey generation unit 33 and the plain text Plane(a) stored in the storage unit 32 (Step S23). - The signature data Sig(a) generated in the signature
data generation unit 34 is transmitted to theverification unit 42 of the semiconductor device 40 (Step S24). Further, the plain text Plane(a) is transmitted to theverification unit 42 of the semiconductor device 40 (Step S25). Note that, although the case where the plain text Plane(a) is stored in thestorage unit 32 is shown inFig. 5 , the plain text Plane(a) may be directly supplied from outside to the signaturedata generation unit 34 and theverification unit 42. - The
verification unit 42 of thesemiconductor device 40 executes a verification algorithm in the digital signature scheme. Specifically, theverification unit 42 generates verification data using the signature data Sig(a) and the public key PK(a) of thesemiconductor device 30, and compares the verification data with the plain text Plane(a) (Step S26). When the verification data and the plain text Plane(a) match (when the verification algorithm accepts the signature data Sig(a)), theverification unit 42 determines that the signature data Sig(a) created by thesemiconductor device 30 is valid. In other words, it is determined that thesemiconductor device 30 has the secret key SK(a). On the other hand, when the verification data and the plain text Plane(a) do not match (when the verification algorithm rejects the signature data Sig(a)), theverification unit 42 determines that the signature data Sig(a) created by thesemiconductor device 30 is invalid. In other words, it is determined that thesemiconductor device 30 does not have the secret key SK(a). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. - Generally, in the case of performing verification using the digital signature scheme between the semiconductor device ICx (which corresponds to a signer) and the semiconductor device ICy (which corresponds to a verifier), ICx needs to have a secret key SK(x). The secret key SK(x) is stored in a nonvolatile memory (storage unit) of the semiconductor device ICx. Therefore, if unauthorized analysis of the semiconductor device is made, leakage of important data such as the secret key SK(x) occurs.
- On the other hand, in the cryptographic communication system according to this embodiment, the secret key SK(a) of the
semiconductor device 30 is generated in the secretkey generation unit 33 of thesemiconductor device 30 by using the unique code UC(a) unique to thesemiconductor device 30 and the correction data CD(a) stored in thestorage unit 32. Because the secret key SK(a), which is important data, is not directly stored in thestorage unit 32, leakage of the secret key SK(a) does not occur even if unauthorized analysis of the semiconductor device is made. Therefore, even when thesemiconductor device 30 and thesemiconductor device 40 are configured using a general-purpose microcomputer with a relatively low security level, a high security level can be achieved. Note that the secure microcomputer may be used for thesemiconductor devices semiconductor device 30 and thesemiconductor device 40. - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that enhance security.
- A third embodiment of the present invention is described hereinafter.
Fig. 7 is a block diagram showing acryptographic communication system 3 according to this embodiment. In this embodiment, the cryptographic communication system is applied to a digital signature system. Although thecryptographic communication system 2 according to the second embodiment transmits the public key PK(a) of thesemiconductor device 30 to thesemiconductor device 40 in Step S21, in thecryptographic communication system 3 according to this embodiment, a public key PK(a) of asemiconductor device 50 is generated using a publickey generation unit 63. - The
cryptographic communication system 3 according to this embodiment shown inFig. 7 includes a semiconductor device ICa (50) and a semiconductor device ICb (60). Thesemiconductor device 50 includes a uniquecode generation unit 51, astorage unit 52, a secretkey generation unit 53, and a signaturedata generation unit 54. - The unique
code generation unit 51 generates a unique code UC(a) that is unique to thesemiconductor device 50 and outputs it to the secretkey generation unit 53. The basic configuration and operation of the uniquecode generation unit 51 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 52 can store correction data CD(a) and plain text Plane(a) in a nonvolatile memory. - The secret
key generation unit 53 generates a secret key SK(a) of thesemiconductor device 50 using the unique code UC(a) output from the uniquecode generation unit 51 and the correction data CD(a) stored in thestorage unit 52. Note that the secretkey generation unit 53 functions as a unique code correction unit. The basic configuration and operation of the secretkey generation unit 53 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The signature
data generation unit 54 generates signature data Sig(a) using the secret key SK(a) generated in the secretkey generation unit 53 and the plain text Plane(a) stored in thestorage unit 52. In other words, the signaturedata generation unit 54 executes a signature generation algorithm in the digital signature scheme. - The
semiconductor device 60 includes a uniquecode generation unit 61, astorage unit 62, a publickey generation unit 63, and averification unit 64. The uniquecode generation unit 61 generates a unique code UC(b) that is unique to thesemiconductor device 60 and outputs it to the publickey generation unit 63. The basic configuration and operation of the uniquecode generation unit 61 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 62 can store correction data CD(b) in a nonvolatile memory. - The public
key generation unit 63 generates a public key PK(a) of thesemiconductor device 50 using the unique code UC(b) output from the uniquecode generation unit 61 and the correction data CD(b) stored in thestorage unit 62. Note that the publickey generation unit 63 functions as a unique code correction unit. The basic configuration and operation of the publickey generation unit 63 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The
verification unit 64 executes a verification algorithm in the digital signature scheme. Specifically, theverification unit 64 generates verification data using the signature data Sig(a) and the public key PK(a) of thesemiconductor device 50. The signature data Sig(a) is data generated by encrypting the plain text Plane(a) using the secret key SK(a) of thesemiconductor device 50. Thus, the verification data obtained by decrypting the signature data Sig(a) using the public key PK(a) of thesemiconductor device 50 is data corresponding to the plain text Plane (a) transmitted from thesemiconductor device 50. Therefore, theverification unit 64 compares the verification data with the plain text Plane(a) and, when the verification data and the plain text Plane(a) match, it can be determined that thesemiconductor device 50 has the secret key SK(a). - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 8 . First, the secretkey generation unit 53 of the semiconductor device 50 (which corresponds to a signer) generates the secret key SK(a) of thesemiconductor device 50 using the unique code UC(a) output from the uniquecode generation unit 51 and the correction data CD(a) stored in the storage unit 52 (Step S31). Then, the signaturedata generation unit 54 of thesemiconductor device 50 executes a signature generation algorithm in the digital signature scheme. Specifically, the signaturedata generation unit 54 generates the signature data Sig(a) using the secret key SK(a) generated in the secretkey generation unit 53 and the plain text Plane(a) stored in the storage unit 52 (Step S32). - On the other hand, the public
key generation unit 63 of the semiconductor device 60 (which corresponds to a verifier) generates the public key PK(a) of thesemiconductor device 50 using the unique code UC(b) output from the uniquecode generation unit 61 and the correction data CD(b) stored in the storage unit 62 (Step S33). - The signature data Sig(a) generated in the signature
data generation unit 54 is transmitted to theverification unit 64 of the semiconductor device 60 (Step S34). Further, the plain text Plane(a) is transmitted to theverification unit 64 of the semiconductor device 60 (Step S35). Note that, although the case where the plain text Plane(a) is stored in thestorage unit 52 is shown inFig. 7 , the plain text Plane (a) may be directly supplied from outside to the signaturedata generation unit 54 and theverification unit 64. - The
verification unit 64 of thesemiconductor device 60 executes a verification algorithm in the digital signature scheme. Specifically, theverification unit 64 generates verification data using the signature data Sig(a) and the public key PK(a) of thesemiconductor device 50, and compares the verification data with the plain text Plane(a) (Step S36). When the verification data and the plain text Plane(a) match (when the verification algorithm accepts the signature data Sig(a)), theverification unit 64 determines that the signature data Sig(a) created by thesemiconductor device 50 is valid. In other words, it is determined that thesemiconductor device 50 has the secret key SK(a). On the other hand, when the verification data and the plain text Plane(a) do not match (when the verification algorithm rejects the signature data Sig(a)), theverification unit 64 determines that the signature data Sig(a) created by thesemiconductor device 50 is invalid. In other words, it is determined that thesemiconductor device 50 does not have the secret key SK(a). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. - In the cryptographic communication system according to this embodiment, the secret key SK(a) of the
semiconductor device 50 is generated in the secretkey generation unit 53 of thesemiconductor device 50 by using the unique code UC(a) unique to thesemiconductor device 50 and the correction data CD(a). Because the secret key SK(a), which is important data, is not directly stored in thestorage unit 52, leakage of the secret key SK(a) being important data does not occur even if unauthorized analysis of the semiconductor device is made. Therefore, even when thesemiconductor device 50 and thesemiconductor device 60 are configured using a general-purpose microcomputer with a relatively low security level, a high security level can be achieved. - Further, in the cryptographic communication system according to this embodiment, the public key PK(a) of the
semiconductor device 50 is generated in the publickey generation unit 63 of thesemiconductor device 60 by using the unique code UC(b) and the correction data CD(b). Because there is no need to transmit the public key PK(a) from thesemiconductor device 50 to thesemiconductor device 60, it is possible to prevent leakage of the cryptographic method in use to a third party, which further enhances the security of the cryptographic communication system. Note that the secure microcomputer may be used for thesemiconductor devices semiconductor device 50 and thesemiconductor device 60. - A fourth embodiment of the present invention is described hereinafter. In the first to third embodiments described above, the correction data CD(a) and CD(b) that are used for generating the common key and the secret key are stored in the semiconductor device. However, the correction data CD(a) and CD(b) that are used for generating the common key and the secret key are also information with a high security level. It is thus preferred to construct a cryptographic communication system in which the correction data CD(a) and CD(b) are not leaked to a third party.
- In a
cryptographic communication system 4 according to this embodiment shown inFig. 9 , the correction data to be used for generating the common key is not stored insemiconductor devices semiconductor device 90 including adatabase 91 that collectively manages the correction data is placed. Because the correction data with a high security level is stored in thedatabase 91 of thesemiconductor device 90, it is preferred to configure thesemiconductor device 90 using the secure microcomputer. On the other hand, information of a common key CK(1) with a high security level is not stored in a nonvolatile memory in thesemiconductor devices semiconductor devices storage units semiconductor devices semiconductor devices - The
cryptographic communication system 4 shown inFig. 9 includessemiconductor devices code generation unit 71, astorage unit 72, and a common key generation unit (first common key generation unit) 73. - The unique
code generation unit 71 generates a unique code UC(a) that is unique to thesemiconductor device 70 and outputs it to the commonkey generation unit 73. The basic configuration and operation of the uniquecode generation unit 71 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 72 stores the common key CK(1) generated in the commonkey generation unit 73 in a volatile memory. The common key CK(1) is erased when thesemiconductor device 70 is powered off. Note that the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 70 may be done on the common key CK(1) stored in the nonvolatile memory. - The common
key generation unit 73 generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 71 and correction data (first correction data) CD(1,a) supplied from thesemiconductor device 90. The commonkey generation unit 73 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 73 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The semiconductor device (second semiconductor device) 80 includes a unique
code generation unit 81, astorage unit 82, and a common key generation unit (second common key generation unit) 83. - The unique
code generation unit 81 generates a unique code UC(b) that is unique to thesemiconductor device 80 and outputs it to the commonkey generation unit 83. The basic configuration and operation of the uniquecode generation unit 81 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 82 stores the common key CK(1) generated in the commonkey generation unit 83 in a volatile memory. The common key CK(1) is erased when thesemiconductor device 80 is powered off. Note that the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 80 may be done on the common key CK(1) stored in the nonvolatile memory. - The common
key generation unit 83 generates the common key CK(1) using the unique code UC(b) output from the uniquecode generation unit 81 and correction data (second correction data) CD(1,b) supplied from thesemiconductor device 90. The commonkey generation unit 83 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 83 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The semiconductor device (third semiconductor device) 90 includes the
database 91 that stores the correction data.Fig. 10 is a table showing an example of data stored in thedatabase 91. As shown inFig. 10 , correction data CD(1,a), CD(1, b), ...) associated with information of the semiconductor devices (ICa, ICb, ICc, ..., ICz) and public keys generated in the semiconductor devices (CK(1), CK(2), CK(3), ..., CK(n)) are stored in thedatabase 91. - For example, in the case of generating the common key CK(1) in the semiconductor device ICa, the correction data CD(1,a) is transmitted to the semiconductor device ICa. Further, in the case of generating the common key CK(1) in the semiconductor device ICb, the correction data CD(1,b) is transmitted to the semiconductor device ICb. Likewise, in the case of generating the common key CK(3) in the semiconductor device ICa, for example, the correction data CD(3,a) is transmitted to the semiconductor device ICa. Further, in the case of generating the common key CK(3) in the semiconductor device ICb, for example, the correction data CD(3,b) is transmitted to the semiconductor device ICb.
- In the cryptographic communication system according to this embodiment, even when the unique codes UC(a) and UC(b) are different, the same common key CK(1) can be generated by performing different operations on the error-corrected unique codes UC(a)'' and UC(b) " using the operation parameter (see the first embodiment).
- Further, the common key CK can be changed by changing the operation parameter of the correction data CD. Thus, a plurality of common keys can be generated like the common keys CK(1), CK(2), CK(3), ..., CK(n) shown in
Fig. 10 by changing the operation parameter of the correction data CD. Thus, in the cryptographic communication system according to this embodiment, by changing the correction data CD that is transmitted from thesemiconductor device 90 to thesemiconductor devices semiconductor devices - Note that because the correction data CD that is transmitted from the
semiconductor device 90 to thesemiconductor devices semiconductor devices semiconductor device 70 has the secret key of thesemiconductor device 70, for example, and thesemiconductor device 90 encrypts the correction data CD(1,a) using the public key of thesemiconductor device 70 when transmitting the correction data CD(1,a). Then, thesemiconductor device 70 decrypts the encrypted correction data CD(1,a) using the secret key, so that the encrypted correction data can be transmitted from thesemiconductor device 90 to thesemiconductor device 70. - An operation of the
cryptographic communication system 4 according to this embodiment is described hereinafter with reference to the flowchart ofFig. 11 . First, the semiconductor device ICs (90) transmits the correction data CD(1,a) to the semiconductor device ICa (70) (Step S41). Next, the commonkey generation unit 73 of thesemiconductor device 70 generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 71 and the correction data CD(1,a) transmitted from the semiconductor device 90 (Step S42). - Further, the semiconductor device ICs (90) transmits the correction data CD(1,b) to the semiconductor device ICb (80) (Step S43). Next, the common
key generation unit 83 of thesemiconductor device 80 generates the common key CK(1) using the unique code UC(b) output from the uniquecode generation unit 81 and the correction data CD(1,b) transmitted from the semiconductor device 90 (Step S44). In this process, both of thesemiconductor device 70 and thesemiconductor device 80 can have the common key CK(1). Thus, thesemiconductor device 70 and thesemiconductor device 80 can perform cryptographic communication using the common key CK(1) (Step S45). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. - Note that, when transmitting the correction data CD from the
semiconductor device 90 to thesemiconductor device semiconductor device 90 to thesemiconductor device semiconductor device 90 to thesemiconductor device semiconductor device - The
semiconductor device 90 and thesemiconductor devices semiconductor device 90 and thesemiconductor devices semiconductor device 90 may transmit the correction data CD to thesemiconductor devices - Further, the system may be configured in such a way that a plurality of sets of semiconductor devices communicate with each other using different common keys CK. For example, the semiconductor devices ICd, ICe and ICf may be configured to communicate with one another using the common key CK(2), and the semiconductor devices ICg, ICh and ICi may be configured to communicate with one another using the common key CK(3). In this case, the correction data CD(2,d), CD(2,e) and CD(2,f) for generating the common key CK(2) are transmitted from the
semiconductor device 90 to the semiconductor devices ICd, ICe and ICf, respectively. Further, the correction data CD(3,g), CD(3,h) and CD(3,i) for generating the common key CK(3) are transmitted from thesemiconductor device 90 to the semiconductor devices ICg, ICh and ICi, respectively. - In this manner, in the cryptographic communication system according to this embodiment, the
semiconductor device 90 that collectively manages the correction data CD is included. Thus, there is no need to store the correction data CD that is used for generating the common key CK in thesemiconductor devices database 91 of thesemiconductor device 90, it is preferred to configure thesemiconductor device 90 using the secure microcomputer. On the other hand, information of the common key CK with a high security level is not stored in a nonvolatile memory in thesemiconductor devices semiconductor devices semiconductor devices - Further, in the cryptographic communication system according to this embodiment, because the correction data CD is collectively managed using the
database 91, the common key CK of each semiconductor device can be changed easily. It is thus possible to easily change the common key CK of thesemiconductor devices - A fifth embodiment of the present invention is described hereinafter.
Fig. 12 is a block diagram showing a cryptographic communication system according to this embodiment. Although the correction data is collectively managed in thedatabase 91 in the cryptographic communication system described in the fourth embodiment, correction data to be transmitted to a semiconductor device ICa (110) and a semiconductor device ICb (120) is generated using a correctiondata generation unit 132 included in asemiconductor device 130. The other configuration is basically the same as that of the cryptographic communication system according to the fourth embodiment. This is described in detail hereinbelow. - A
cryptographic communication system 5 shown inFig. 12 includessemiconductor devices semiconductor device 110 includes a uniquecode generation unit 111, astorage unit 112 and a commonkey generation unit 113. - The unique
code generation unit 111 generates a unique code UC(a) that is unique to thesemiconductor device 110 and outputs it to the commonkey generation unit 113 and the correctiondata generation unit 132 of thesemiconductor device 130. The basic configuration and operation of the uniquecode generation unit 111 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 112 stores a common key CK(1) generated in the commonkey generation unit 113 in a volatile memory. The common key CK(1) is erased when thesemiconductor device 110 is powered off. Note that the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 110 may be done on the common key CK(1) stored in the nonvolatile memory. - The common
key generation unit 113 generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 111 and correction data CD(1,a) supplied from thesemiconductor device 130. The commonkey generation unit 113 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 113 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The
semiconductor device 120 includes a uniquecode generation unit 121, astorage unit 122 and a commonkey generation unit 123. - The unique
code generation unit 121 generates a unique code UC(b) that is unique to thesemiconductor device 120 and outputs it to the commonkey generation unit 123 and the correctiondata generation unit 132 of thesemiconductor device 130. The basic configuration and operation of the uniquecode generation unit 121 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 122 stores a common key CK(1) generated in the commonkey generation unit 123 in a volatile memory. The common key CK(1) is erased when thesemiconductor device 120 is powered off. Note that the common key CK(1) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 120 may be done on the common key CK(1) stored in the nonvolatile memory. - The common
key generation unit 123 generates the common key CK(1) using the unique code UC(b) output from the uniquecode generation unit 121 and correction data CD(1,b) supplied from thesemiconductor device 130. The commonkey generation unit 123 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 123 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The
semiconductor device 130 includes astorage unit 131 and a correctiondata generation unit 132. Thestorage unit 131 stores the common key CK(1) in a nonvolatile memory. The information of the common key CK(1) is not erased even when thesemiconductor device 130 is powered off. Thus, it is preferred to configure thesemiconductor device 130 using the secure microcomputer in order to prevent leakage of the information of the common key CK(1) to a third party by unauthorized analysis of the semiconductor device. Note that thesemiconductor devices - The correction
data generation unit 132 generates the correction data CD(1,a) using the unique code UC(a) of thesemiconductor device 110 and the common key CK(1) stored in thestorage unit 131. Further, the correctiondata generation unit 132 generates the correction data CD(1,b) using the unique code UC(b) of thesemiconductor device 120 and the common key CK(1) stored in thestorage unit 131. - An operation when the correction
data generation unit 132 generates the correction data is described hereinafter in detail with reference toFig. 14 . Although the case where the correctiondata generation unit 132 generates the correction data CD(1,a) is described below, the same applies to the case where the correctiondata generation unit 132 generates the correction data CD(1,b). - First, the correction
data generation unit 132 acquires the unique code UC(a) a plurality of times from the semiconductor device ICa (110) (Step S61). Next, the correctiondata generation unit 132 statistically processes the unique code UC(a) acquired in Step S61, and classifies the respective bits of the unique code UC(a) into (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). Then, the correctiondata generation unit 132 generates mask data using the (2) bits with high variability (Step S62). At this time, information indicating the position of the bit that varies with higher probability than a specified threshold among the bits of the unique code UC(a) is set as the mask data. For example, in the mask data shown inFig. 4 , the position of the bit with high variability (i.e. the position to be masked) is indicated by "0". - Next, the correction
data generation unit 132 masks the unique code UC(a) using the mask data generated in Step S62 and eliminates the bit with high variability. It then generates an ECC code for correcting the error of the masked unique code UC(a)' (i.e. the unique code containing bits with a stable value and bits with low variability) (Step S63). The ECC code is BCH code or Reed-Solomon code, for example. - Then, the correction
data generation unit 132 generates an operation parameter using the unique code UC(a) " processed using the mask data generated in Step S62 and the ECC code generated in Step S63 (which is the unique code containing bits with a stable value) and the common key CK(1) stored in the storage unit 131 (Step S64). The operation parameter is a parameter required to generate the common key CK(1) from the corrected unique code UC(a)". - Finally, the correction
data generation unit 132 transmits the mask data, the ECC code and the operation parameter generated by the above process as the correction data CD(1,a) to the semiconductor device ICa (110) (Step S65). - An operation of the
cryptographic communication system 5 according to this embodiment is described hereinafter with reference to the flowchart ofFig. 13 . First, the semiconductor device ICa (110) transmits the unique code UC(a) to the correctiondata generation unit 132 of the semiconductor device Ics (130) (Step S51). Next, the correctiondata generation unit 132 of thesemiconductor device 130 generates the correction data CD(1,a) using the transmitted unique code UC(a) and the common key CK(1) (Step S52). For the correctiondata generation unit 132 to generate the correction data CD(1,a), it is necessary to acquire the unique code UC(a) a plurality of times. Thus, Step S51 is repeated to acquire the unique code UC(a) a plurality of times. The generated correction data CD(1,a) is transmitted to the semiconductor device 110 (Step S53). The commonkey generation unit 113 of thesemiconductor device 110 generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 111 and the correction data CD(1,a) transmitted from the semiconductor device 130 (Step S54). - Further, the semiconductor device ICb (120) transmits the unique code UC(b) to the correction
data generation unit 132 of the semiconductor device ICs (130) (Step S55). Next, the correctiondata generation unit 132 of thesemiconductor device 130 generates the correction data CD(1,b) using the transmitted unique code UC(b) and the common key CK(1) (Step S56). For the correctiondata generation unit 132 to generate the correction data CD(1,b), it is necessary to acquire the unique code UC(b) a plurality of times. Thus, Step S55 is repeated to acquire the unique code UC(b) a plurality of times. The generated correction data CD(1,b) is transmitted to the semiconductor device 120 (Step S57). The commonkey generation unit 123 of thesemiconductor device 120 generates the common key CK(1) using the unique code UC(b) output from the uniquecode generation unit 121 and the correction data CD(1,b) transmitted from the semiconductor device 130 (Step S58). - By the above process, both of the
semiconductor device 110 and thesemiconductor device 120 can have the common key CK(1). Thus, thesemiconductor device 110 and thesemiconductor device 120 can perform cryptographic communication using the common key CK(1.) (Step S59). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. For example, Steps S51 to S54 and Steps S55 to S58 may be performed in parallel. - As described above, in the cryptographic communication system according to this embodiment also, the
semiconductor device 130 that collectively manages the correction data is included. Thus, there is no need to store the correction data that is used for generating the common key in thesemiconductor devices database 131 of thesemiconductor device 130, it is preferred to configure thesemiconductor device 130 using the secure microcomputer. On the other hand, information of the common key CK with a high security level is not stored in a nonvolatile memory in thesemiconductor devices semiconductor devices semiconductor devices - A sixth embodiment of the present invention is described hereinafter.
Fig. 15 is a block diagram showing a cryptographic communication system according to this embodiment. In the cryptographic communication system according to the fifth embodiment, the case where the semiconductor device ICa (110) and the semiconductor device ICb (120) have the same common key CK(1) is described. In the cryptographic communication system according to this embodiment, a semiconductor device ICa (140) and a semiconductor device ICb (150) have different common keys and communicate with each other through a semiconductor device ICs (160). The other configuration is basically the same as that of the cryptographic communication system according to the fifth embodiment. This is described in detail hereinbelow. - A
cryptographic communication system 6 shown inFig. 15 includessemiconductor devices semiconductor device 140 includes a uniquecode generation unit 141, astorage unit 142 and a commonkey generation unit 143. - The unique
code generation unit 141 generates a unique code UC(a) that is unique to thesemiconductor device 140 and outputs it to the commonkey generation unit 143 and the correctiondata generation unit 162 of thesemiconductor device 160. The basic configuration and operation of the uniquecode generation unit 141 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 142 stores a common key (first common key) CK(1) generated in the commonkey generation unit 143 in a volatile memory. The common key CK(1) is erased when thesemiconductor device 140 is powered off. - The common
key generation unit 143 generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 141 and correction data CD(1,a) supplied from thesemiconductor device 160. The commonkey generation unit 143 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 143 are the same as those of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The
semiconductor device 150 includes a uniquecode generation unit 151, astorage unit 152 and a commonkey generation unit 153. - The unique
code generation unit 151 generates a unique code UC(b) that is unique to thesemiconductor device 150 and outputs it to the commonkey generation unit 153 and the correctiondata generation unit 162 of thesemiconductor device 160. The basic configuration and operation of the uniquecode generation unit 151 are the same as those of the uniquecode generation unit 11 described in the first embodiment and redundant explanation thereof is omitted. - The
storage unit 152 stores a common key (second common key) CK(2) generated in the commonkey generation unit 153 in a volatile memory. The common key CK(2) is erased when thesemiconductor device 150 is powered off. - The common
key generation unit 153 generates the common key CK(2) using the unique code UC(b) output from the uniquecode generation unit 151 and correction data CD(2,b) supplied from thesemiconductor device 160. The commonkey generation unit 153 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 153 are the same as those, of the commonkey generation unit 13 described in the first embodiment and redundant explanation thereof is omitted. - The
semiconductor device 160 includes astorage unit 161 and a correctiondata generation unit 162. Thestorage unit 161 stores the common key CK(1) and the common key CK(2) in a nonvolatile memory. The information of the common key CK(1) and the common key CK(2) are not erased even when thesemiconductor device 160 is powered off. Thus, it is preferred to configure thesemiconductor device 160 using the secure microcomputer in order to prevent leakage of the information of the common key Ack(1) and the common key CK(2) to a third party by unauthorized analysis of the semiconductor device. Note that thesemiconductor devices - The correction
data generation unit 162 generates the correction data CD(1,a) using the unique code UC(a) of thesemiconductor device 140 and the common key CK(1) stored in thestorage unit 161. Further, the correctiondata generation unit 162 generates the correction data CD(2,b) using the unique code UC(b) of thesemiconductor device 150 and the common key CK(2) stored in thestorage unit 161. - An operation of the
cryptographic communication system 6 according to this embodiment is described hereinafter with reference to the flowchart ofFig. 16 . First, the semiconductor device ICa (140) transmits the unique code UC(a) to the correctiondata generation unit 162 of the semiconductor device ICs (160) (Step S71). Next, the correctiondata generation unit 162 of thesemiconductor device 160 generates the correction data CD(1,a) using the transmitted unique code UC(a) and the common key CK(1) (Step S72) . For the correctiondata generation unit 162 to generate the correction data CD(1,a), it is necessary to acquire the unique code UC(a) a plurality of times. Thus, Step S71 is repeated to acquire the unique code UC(a) a plurality of times. The generated correction data CD(1,a) is transmitted to the semiconductor device 140 (Step S73). The commonkey generation unit 143 of thesemiconductor device 140 generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 141 and the correction data CD(1,a) transmitted from the semiconductor device 160 (Step S74). - Further, the semiconductor device ICb (150) transmits the unique code UC(b) to the correction
data generation unit 162 of the semiconductor device ICs (160) (Step S75). Next, the correctiondata generation unit 162 of thesemiconductor device 160 generates the correction data CD(2,b) using the transmitted unique code UC(b) and the common key CK(2) (Step S76). For the correctiondata generation unit 162 to generate the correction data CD(2,b), it is necessary to acquire the unique code UC(b) a plurality of times. Thus, Step S75 is repeated to acquire the unique code UC(b) a plurality of times. The generated correction data CD(2,b) is transmitted to the semiconductor device 150 (Step S77). The commonkey generation unit 153 of thesemiconductor device 150 generates the common key CK(2) using the unique code UC(b) output from the uniquecode generation unit 151 and the correction data CD(2,b) transmitted from the semiconductor device 160 (Step S78). - By the above process, both of the
semiconductor device 140 and thesemiconductor device 160 can have the common key CK(1). Thus, thesemiconductor device 140 and thesemiconductor device 160 can perform cryptographic communication using the common key CK(1) (Step S79). Further, both of thesemiconductor device 150 and thesemiconductor device 160 can have the common key CK(2). Thus, thesemiconductor device 150 and thesemiconductor device 160 can perform cryptographic communication using the common key CK(2) (Step S80). Therefore, thesemiconductor device 140 and thesemiconductor device 150 can communicate through the semiconductor device 160 (gateway configuration). Note that the sequence of the above steps can be changed as appropriate as long as it is consistent. For example, Steps S71 to S74 and Steps S75 to S78 may be performed in parallel. - As described above, in the cryptographic communication system according to this embodiment also, the
semiconductor device 160 that collectively manages the correction data is included. Thus, there is no need to store the correction data that is used for generating the common key in thesemiconductor devices database 161 of thesemiconductor device 160, it is preferred to configure thesemiconductor device 160 using the secure microcomputer. On the other hand, information of the common key CK with a high security level is not stored in a nonvolatile memory in thesemiconductor devices semiconductor devices semiconductor devices - A seventh embodiment of the present invention is described hereinafter.
Fig. 17 is a block diagram showing a case where the cryptographic communication system according to the first to sixth embodiment is applied to a vehicle-mounted semiconductor device. As shown inFig. 17 , avehicle 180 includes agateway unit 170, a faultdiagnostic unit 171, anengine control unit 172, abrake control unit 173, alamp control unit 174, a doorlock control unit 175, a keyinsertion control unit 176, acar navigation system 178, and a DCM (Data Communication Module) 179. - The
gateway unit 170 is equipment for relaying a network composed of theunits 171 to 176 and thecar navigation system 178. A secure microcomputer ICs is included in thegateway unit 170. The faultdiagnostic unit 171 is a unit for making a diagnosis whether the components of thevehicle 180 are at fault. A semiconductor device ICa is included in the faultdiagnostic unit 171. Theengine control unit 172 is a unit for making electrical control (fuel supply, ignition timing control etc.) of engine operation in a comprehensive manner. A semiconductor device ICb is included in theengine control unit 172. Thebrake control unit 173 is a unit for controlling a brake such as ABS (Antilock Brake System). A semiconductor device ICc is included in thebrake control unit 173. Thelamp control unit 174 is a unit for controlling a headlight, winker and the like of the vehicle. A semiconductor device ICd is included in thelamp control unit 174. - The door
lock control unit 175 is a unit for controlling door lock. A semiconductor device ICe and a communication unit for radio communication with a key 177 are included in the doorlock control unit 175. The keyinsertion control unit 176 is a unit for determining whether the insertedkey 177 is a valid user key or not. A semiconductor device ICf and a communication unit for radio communication with the key 177 are included in the keyinsertion control unit 176. A semiconductor device ICg and a communication unit for radio communication with the doorlock control unit 175 and the keyinsertion control unit 176 are included in the key 177. General-purpose microcomputers, for example, may be used for the semiconductor devices ICa to ICg that are included in therespective units 171 to 176 and the key 177. - A secure microcomputer ICh is included in the
car navigation system 178. TheDCM 179 is a communication module for transmitting information acquired from theunits 171 to 176 in the vehicle to anexternal server 181 or acquiring information from theserver 181. - The
respective units 171 to 176 and thecar navigation system 178 are connected to thegateway unit 170, and theunits 171 to 176 are configured to be able to communicate with one another through thegateway unit 170. The common key that is used for communication between therespective units 171 to 176 and thegateway unit 170 may differ from unit to unit. For example, the common key CK(1) may be used for communication between the faultdiagnostic unit 171 and thegateway unit 170, and the common key CK(2) may be used for communication between theengine control unit 172 and thegateway unit 170. Note that, in this case, the semiconductor device ICa (140) in thecryptographic communication system 6 according to the sixth embodiment shown inFig. 15 corresponds to the faultdiagnostic unit 171, the semiconductor device ICb (150) corresponds to theengine control unit 172, and the semiconductor device ICs (160) corresponds to thegateway unit 170. - The correction data CD that is used to generate the common key to be used for communication between the
respective units 171 to 176 and thegateway unit 170 may be stored in the semiconductor device ICs of thegateway unit 170 or the semiconductor device ICh of thecar navigation system 178, for example. Further, the correction data CD that is used to generate the common key may be supplied from theserver 181. With the correction data CD supplied from theserver 181, the common key to be used for communication between therespective units 171 to 176 and thegateway unit 170 can be easily changed. The correction data CD supplied from theserver 181 may be stored in the semiconductor device ICs of thegateway unit 170 or the semiconductor device ICh of thecar navigation system 178, for example. - Further, the
car navigation system 178 may transmit the information (for example, failure information etc.) acquired from theunits 171 to 176 to theserver 181 through theDCM 179. At this time, communication between theDCM 179 and theserver 181 may be encrypted. - In the example of
Fig. 17 , the configuration in which theunits 171 to 176 perform communication through thegateway unit 170 is shown. However, theunits 171 to 176 may communicate with one another using the same common key. In this case, theunits 171 to 176 are configured to be connected to one another through a common bus, for example. The common key stored in therespective units 171 to 176 may be generated using the method described in the first embodiment (Fig. 1 ), the fourth embodiment (Fig. 9 ), and the fifth embodiment (Fig. 12 ), for example. -
Fig. 18 is a block diagram showing a cryptographic communication system according to an eighth embodiment. Acryptographic communication system 201 according to this embodiment includes a semiconductor device ICa (first semiconductor device) 210 and a semiconductor device ICz (second semiconductor device) 220. The semiconductor device ICa (210) establishes a secure network with another semiconductor device (not shown). In this embodiment, a case where the semiconductor device ICz (220) is added to the secure network including the semiconductor device ICa (210) is described. - The
semiconductor device 210 includes a uniquecode generation unit 211, astorage unit 212, a common key generation unit (first common key generation unit) 213, and a correctiondata generation unit 214. - The unique
code generation unit 211 generates a unique code (first unique code) UC(a) having a value unique to thesemiconductor device 210 and containing a random error and outputs it to the commonkey generation unit 213. The unique code UC(a) is a value determined by physical properties inherent to an element included in thesemiconductor device 210. For example, the uniquecode generation unit 211 may generate the unique code UC(a) using a value at startup of a memory element included in thesemiconductor device 210. The unique code is a code generated using the property that actually fabricated ICs vary despite that the design of the ICs is the same. This technique is called PUF (Physical Unclonable Function), and it is a technique that, even when a plurality of ICs having the same circuit are fabricated at a time on one semiconductor wafer by the same fabrication device, generates unique codes for the respective ICs and further makes the ICs unclonable. Use of this technique achieves effective concealment of data without a need for special hardware such as a tamper-resistant chip. - The
storage unit 212 can store correction data (first correction data) CD(a), and a common key (first common key) CK(a) generated in the commonkey generation unit 213. Thestorage unit 212 includes a volatile memory (for example, SRAM) and a nonvolatile memory (for example, flash memory), for example, and the correction data CD(a) is stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 212 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 210 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 210 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 213 generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 211 and the correction data CD(a) stored in thestorage unit 212. - The unique code UC(a) generated in the unique
code generation unit 211 is data containing bit values that vary depending on external factors during generation of the unique code, such as temperature and voltage, for example. Therefore, the unique code UC(a) generated in the uniquecode generation unit 211 contains three types of bits: (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). In this manner, the unique code UC(a) generated in the uniquecode generation unit 211 contains (2) bits with high variability and (3) bits with low variability. Accordingly, the unique code UC(a) has different values each time generated. - The bit with high variability can be found in the fabrication process. Thus, by making each bit decision during the fabrication process, mask data to mask the bit with high variability can be created. By masking the unique code UC(a) generated in the unique
code generation unit 211 using the mask data, the bit with high variability contained in the unique code UC(a) can be eliminated. Because the position of the bit with high variability differs from device to device, the mask data is data unique to the semiconductor device. - On the other hand, the bit with low variability varies due to external factors, remaining charges and the like, and it is thus difficult to make estimation. Therefore, for the bit with low variability, an ECC code such as BCH code or Reed-Solomon code, for example, is generated during fabrication, and error correction for eliminating a bit with variability is performed using the ECC code. An operation of the common
key generation unit 213 is specifically described hereinafter. -
Fig. 20 is a flowchart to explain an operation of the commonkey generation unit 213, andFig. 21 is a table showing an example of a unique code processed in the commonkey generation unit 213. First, the commonkey generation unit 213 reads the unique code UC(a) from the unique code generation unit 211 (Step S111). The unique code UC(a) read in this step is a unique code on which error correction for eliminating a bit with variability is not made. - Next, the common
key generation unit 213 masks the read unique code UC(a) using the mask data contained in the correction data CD(a) (Step S112). The mask data is data for masking a bit with a high error rate having a variable bit value among the bits of the unique code UC(a). In the example shown inFig. 21 , because the error rate of the first bit and the sixth bit of the unique code UC(a) is high, the mask data is "0". Because the other bits are bits with a low error rate or bits with a stable value, the mask data is "1". In other words, the mask data for the bit that needs to be masked is "0", and the mask data for the bit that does not need to be masked is "1". By masking the unique code UC(a) using the mask data, masked unique code UC(a)' in which the first bit and the sixth bit of the unique code UC(a) are eliminated can be obtained (the bits eliminated by masking are indicated by "X"). After, that, the masked unique code UC(a)' is left-justified. - Then, using the ECC code (error correction code) contained in the correction data CD(a), the common
key generation unit 213 corrects the error of the bit with a low degree of variability contained in the masked unique code UC(a)', thereby obtaining a unique code UC(a)" (Step S113). In the example shown inFig. 21 , as a result that the masked unique code UC(a)' is processed using the ECC code, the first bit is corrected from "0" to "1". - Then, the common
key generation unit 213 performs a specified operation on the error-corrected unique code UC(a)" using an operation parameter contained in the correction data CD(a) (Step S114). In the example shown inFig. 21 , NOT operation is performed on the error-corrected unique code UC(a) " . The unique code UC(a) after this operation is the common key CK(a). Note that the NOT operation is just one example, and any operation may be performed on the error-corrected unique code UC(a) " . By changing the operation parameter, it is possible to change the common key CK(a) according to need. Further, by performing a specified operation on the error-corrected unique code UC(a)" using the operation parameter, the common key CK(a) can be generated as a code that is not apparently similar to the unique code UC(a). This further enhances the security level. Furthermore, the operation performed on the error-corrected unique code UC(a)" may be skipped. In this case, the unique code UC(a)" processed using the mask data and the ECC code serves as the common key CK(a). The common key CK(a) generated in this manner is output to thestorage unit 212. - As described above, the common
key generation unit 213 has the function of generating the common key CK(a) and also has the function of correcting the unique code UC(a) using the correction data CD(a). Thus, the commonkey generation unit 213 functions also as a unique code correction unit. - Note that the mask code, the ECC code and the operation parameter contained in the correction data CD(a) are generated in advance as unique data of the
semiconductor device 210 and stored in thestorage unit 212. A method of generating the correction data CD(a) is the same as that of the case where the correctiondata generation unit 214 generates the correction data CD(z). - The correction
data generation unit 214 generates correction data (second correction data) CD(z) using a unique code (second unique code) UC(z) of thesemiconductor device 220 and the common key CK(a). An operation when the correctiondata generation unit 214 generates the correction data is described hereinafter in detail with reference toFig. 22 . - First, the correction
data generation unit 214 acquires the unique code UC(z) a plurality of times from the semiconductor device ICz (220) (Step S121). Next, the correctiondata generation unit 214 statistically processes the unique code UC(z) acquired in Step S121, and classifies the respective bits of the unique code UC(z) into (1) bits with a stable value, (2) bits with high variability (i.e. bits with a relatively large variation in value) and (3) bits with low variability (i.e. bits with a relatively small variation in value). Then, the correctiondata generation unit 214 generates mask data using the (2) bits with high variability (Step S122). At this time, information indicating the position of the bit that varies with higher probability than a specified threshold among the bits of the unique code UC(z) is set as the mask data. For example, in the mask data shown inFig. 21 , the position of the bit with high variability (i.e. the position to be masked) is indicated by "0". - Next, the correction
data generation unit 214 masks the unique code UC(z) using the mask data generated in Step S122 and eliminates the bit with high variability. It then generates an ECC code for making a correction to remove the bits with variability of the masked unique code UC(a)' (i.e. the unique code containing bits with a stable value and bits with low variability) (Step S123). The ECC code is BCH code or Reed-Solomon code, for example. - Then, the correction
data generation unit 214 generates an operation parameter using the unique code UC(a) " processed using the mask data generated in Step S122 and the ECC code generated in Step S123 (which is the unique code containing bits with a stable value) and the common key CK(a) stored in the storage unit 212 (Step S124). The operation parameter is thus a parameter required to generate the common key CK(a) from the corrected unique code UC(z) " . Finally, the correctiondata generation unit 214 transmits the mask data, the ECC code and the operation parameter generated by the above process as the correction data CD(z) to the semiconductor device ICz (220) (Step S125). - Note that the process for generating the correction data CD(z) (Step S121 to S125) may be executed in a distributed manner among a plurality of semiconductor devices.
Fig. 23 is a diagram showing a case where the correction data CD(z) is generated using a plurality of semiconductor devices ICa, ICb, ICc and ICd. The semiconductor devices ICa, ICb, ICc and ICd establish a secure network. - In the example shown in
Fig. 23 , the semiconductor device ICa executes Steps S121 and S125. Thus, the semiconductor device ICa functions as a teller with the semiconductor device ICz. The semiconductor device ICb executes Step S122 (mask data generation). The semiconductor device ICc executes Step S123 (ECC code generation). The semiconductor device ICd executes Step S124 (operation parameter generation). Note that the example shown inFig. 23 is one example, and the semiconductor devices to execute the respective steps may be assigned arbitrarily. In this manner, by performing the process (Step S121 to S125) for generating the correction data CD(z) in a distributed manner among a plurality of semiconductor devices, it is possible to improve the security level of the cryptographic communication system and avoid the concentration of loads on one semiconductor device. - The
semiconductor device 220 shown inFig. 18 includes a uniquecode generation unit 221, astorage unit 222, and a common key generation unit (second common key generation unit) 223. The uniquecode generation unit 221 generates a unique code UC(z) having a value unique to thesemiconductor device 220 and containing a random error and outputs it to the correctiondata generation unit 214 and the commonkey generation unit 223. Note that the configuration and operation of the uniquecode generation unit 221 is basically the same as the uniquecode generation unit 211 described above. - The
storage unit 222 can have the common key CK(a) generated in the commonkey generation unit 223. Thestorage unit 222 stores the common key CK(a) in a volatile memory. Thus, although thestorage unit 222 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 220 is powered off. Note that the common key CK(a) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 220 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 223 generates the common key (first common key) CK(a) using the unique code UC(z) output from the uniquecode generation unit 221 and the correction data CD(z) output from the correctiondata generation unit 214. Note that a method of generating the common key CK(a) in the commonkey generation unit 223 is basically the same as the method of generating the common key CK(a) in the commonkey generation unit 213 described above. - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 19 . First, the commonkey generation unit 213 of the semiconductor device ICa (210) generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 211 and the correction data CD(a) stored in the storage unit 212 (Step S101). Then, the semiconductor device ICa (210) starts communication with other semiconductor device ICb to ICy (not shown) using the common key CK(a) (Step S102). - The
semiconductor device 220 transmits the unique code UC(z) of thesemiconductor device 220. to the correctiondata generation unit 214 of the semiconductor device 210 (Step S103). The correctiondata generation unit 214 of thesemiconductor device 210 generates the correction data CD(z) using the unique code UC(z) of thesemiconductor device 220 and the common key CK(a) stored in the storage unit 212 (Step S104). For the correctiondata generation unit 214 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Step S103 is repeated to acquire the unique code UC(z) a plurality of times. - The generated correction data CD(z) is transmitted to the common
key generation unit 223 of the semiconductor device 220 (Step S105). The commonkey generation unit 223 of thesemiconductor device 220 generates the common key CK(a) using the unique code UC(z) output from the uniquecode generation unit 221 and the correction data CD(z) output from the correction data generation unit 214 (Step S106). By the above process, the addedsemiconductor device 220 can have the common key CK(a). Thus, the added semiconductor device (ICz) 220 becomes able to perform cryptographic communication with the semiconductor device (ICa) 210 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S107). This process is a process of calculating the correction data CD(z) from the transmitted data UC(z) and sending it back as described above. There is a possibility that a malicious attacker repeats this process using a prepared ICz or repeatedly transmits different data UC(z) and thereby analyzes an algorithm of the common key generation unit by CD(z) and the current waveform data during the process. Therefore, it is preferred to impose a limit (for example, about three to five times) to the number of times for the flow shown inFig. 19 . - As described earlier, in the case of adding the semiconductor device ICz to the cryptographic communication system in which secure communication is established, it is necessary to verify whether the semiconductor device ICz to be added is a proper semiconductor device. However, in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, it is necessary to incorporate an expensive secure server, for example, into the cryptographic communication system. This causes an increase in costs of the cryptographic communication system,
- On the other hand, in the cryptographic communication system according to this embodiment, the correction
data generation unit 214 in thesemiconductor device 210 generates the correction data CD(z) for correcting the unique code UC(z) by using the unique code UC(z) having a value unique to thesemiconductor device 220 and containing a random error and the common key CK(a), and the commonkey generation unit 223 in thesemiconductor device 220 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of thesemiconductor device 220. It is thus guaranteed that the semiconductor device ICa (210) and the semiconductor device ICz (220) generate the common key CK(a) based on the same rule, so that the security to add the semiconductor device ICz (220) to the secure network including the semiconductor device ICa (210) is guaranteed. - Therefore, because there is no need to incorporate an expensive secure server into the cryptographic communication system in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, it is possible to add the semiconductor device easily and at low cost to the cryptographic communication system in which secure communication is performed.
- Further, in the cryptographic communication system according to this embodiment, the common
key generation unit 213 in thesemiconductor device 210 generates the common key CK(a) using the unique code UC(a) having a value unique to thesemiconductor device 210 and the correction data CD(a). Further, the commonkey generation unit 223 in thesemiconductor device 220 generates the common key CK(a) using the unique code UC(z) having a value unique to thesemiconductor device 220 and the correction data CD(z). Because the common key CK(a), which is important data, is not directly stored in thestorage units - Methods of analyzing a semiconductor device for unauthorized acquisition of data are as follows.
- (1) A method that makes modification to the semiconductor device using FIB (Focused Ion Beam) and physically analyzes the semiconductor device using a probe.
- (2) Fault tree analysis that makes a CPU run away by applying an electromagnetic wave such as a laser beam to the semiconductor device or inserting noise to a power supply terminal and thereby acquires data in an unauthorized manner.
- (3) Leakage analysis that observes the current consumption of the semiconductor device and analyzes key data.
- In order to prevent the unauthorized analysis, in the field where a high security level is required, a microcomputer with a high security level (which is referred to hereinafter as a secure microcomputer) is used. The secure microcomputer has a shield to protect a wiring area, a function of detecting light or signal noise, a function of disrupting the current by combining a random number signal with a signal and the like.
- In this manner, it is possible to prevent a third party's unauthorized analysis of the semiconductor device by using the secure microcomputer. However, in the case of using the secure microcomputer, although the unauthorized analysis can be prevented, semiconductor device manufacturers cannot carry out failure analysis and breakdown analysis because of its high tamper resistance. Particularly, in a vehicle-mounted microcomputer (ECU etc.) for automobile use, failure analysis and breakdown analysis of a semiconductor device are necessary because high reliability is required. For this reason, a general-purpose microcomputer having a lower security level than the secure microcomputer has been widely used as the vehicle-mounted microcomputer. Thus, a cryptographic communication system that increases the security level of a semiconductor device with use of a general-purpose microcomputer has been required for the vehicle-mounted microcomputer.
- In the cryptographic communication system according to this embodiment, because important data such as the common key CK(a) is not directly stored in the
storage units semiconductor device 210 and thesemiconductor device 220 are configured using general-purpose microcomputers with a relatively low security level, a high security level can be achieved. - Note that the correction data CD(a) that is used to generate the common key CK(a) in the
semiconductor device 210 is information with a relatively high security level, though the security level is lower than that of the common key CK(a). Thus, the security microcomputer may be used for thesemiconductor device 210 in which the correction data CD(a) is stored in order to prevent leakage of the correction data CD(a) to a third party. - Further, the correction data CD(z) that is transmitted from the
semiconductor device 210 to thesemiconductor device 220 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a). Thus, when transmitting the correction data CD(z) from thesemiconductor device 210 to thesemiconductor device 220, the correction data CD(z) may be encrypted using the public key cryptosystem before transmission. In this case, thesemiconductor device 220, for example, has the secret key of thesemiconductor device 220, and thesemiconductor device 210 encrypts the correction data CD(z) using the public key of thesemiconductor device 220 before transmitting the correction data CD(z). Then, thesemiconductor device 220 decrypts the encrypted correction data CD(z) using the secret key. The encrypted correction data can be thereby transmitted from thesemiconductor device 210 to thesemiconductor device 220. - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- A ninth embodiment of the present invention is described hereinafter.
Fig. 24 is a block diagram showing acryptographic communication system 202 according to this embodiment. A unique code UC(z) that is output from a semiconductor device ICz is information with a relatively low security level because it contains error information for its characteristics. Thus, in the cryptographic communication system according to the eighth embodiment, the unique code UC(z) is not encrypted when transmitting the unique code UC(z) from the semiconductor device ICz to the semiconductor device ICa. However, because the unique code UC(z) is information unique to the semiconductor device ICz, though it contains error information, it is preferred to encrypt the unique code UC(z) before transmission. Thus, in the cryptographic communication system according to this embodiment, the unique code UC(z) is encrypted before transmitting the unique code UC(z) from the semiconductor device ICz to the semiconductor device ICa. - The
cryptographic communication system 202 shown inFig. 24 includes a semiconductor device ICa (230) and a semiconductor device ICz (240). Thesemiconductor device 230 includes a uniquecode generation unit 231, astorage unit 232, a commonkey generation unit 233, a correctiondata generation unit 234, and adecryption unit 235. - The unique
code generation unit 231 generates a unique code UC(a) that is unique to thesemiconductor device 230 and outputs it to the commonkey generation unit 233. The basic configuration and operation of the uniquecode generation unit 231 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 232 can store correction data CD(a), a public key PK(a) and a secret key SK(a) of thesemiconductor device 230, and a common key CK(a) generated in the commonkey generation unit 233. Thestorage unit 232 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(a), the public key PK(a) and the secret key SK(a) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 232 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 230 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 230 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 233 generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 231 and correction data CD(a) stored in thestorage unit 232. The commonkey generation unit 233 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 233 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The correction
data generation unit 234 generates correction data (second correction data) CD(z) using a unique code UC(z) of thesemiconductor device 240 and the common key CK(a). The basic configuration and operation of the correctiondata generation unit 234 are the same as those of the correctiondata generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted. - The
decryption unit 235 decrypts a unique code UC(z)_c encrypted by anencryption unit 244 of thesemiconductor device 240 using the secret key SK(a) of thesemiconductor device 230 and thereby generates the unique code UC(z). - The
semiconductor device 240 includes a uniquecode generation unit 241, astorage unit 242, a commonkey generation unit 243, and anencryption unit 244. The uniquecode generation unit 241 generates a unique code UC(z) that is unique to thesemiconductor device 240 and outputs it to theencryption unit 244 and the commonkey generation unit 243. The basic configuration and operation of the uniquecode generation unit 241 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 242 can have the common key CK(a) generated in the commonkey generation unit 243. Thestorage unit 242 stores the common key CK(a) in a volatile memory. Thus, although thestorage unit 242 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 240 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 240 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 243 generates the common key CK(a) using the unique code UC(z) output from the uniquecode generation unit 241 and the correction data CD(z) output from the correctiondata generation unit 234. The commonkey generation unit 243 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 243 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The
encryption unit 244 encrypts the unique code UC(z) generated in the uniquecode generation unit 241 by using the public key PK(a) of thesemiconductor device 230. The public key PK(a) to be used for encryption may be transmitted from thesemiconductor device 230 to thesemiconductor device 240 in advance and stored in thestorage unit 242. Alternatively, the public key PK(a) to be used for encryption may be directly supplied from thesemiconductor device 230 to theencryption unit 244 at the time when theencryption unit 244 encrypts the unique code UC(z). The encrypted unique code UC(z)_c is output to thedecryption unit 235 of thesemiconductor device 230. - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 25 . First, the commonkey generation unit 233 of the semiconductor device ICa (230) generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 231 and the correction data CD(a) stored in the storage unit 232 (Step S130). Then, the semiconductor device ICa (230) starts communication with other semiconductor devices ICb to ICy (not shown) using the common key CK(a) (Step S131). - Then, the semiconductor device ICz (240) makes a request for transmission of the correction data CD(z) to the semiconductor device ICa (230) (Step S132). Receiving the request for transmission of the correction data CD(z), the
semiconductor device 230 transmits the public key PK(a) of thesemiconductor device 230 to the semiconductor device 240 (Step S133). Theencryption unit 244 of thesemiconductor device 240 encrypts the unique code UC(z) using the public key PK(a) of the semiconductor device 230 (Step S134). Note that the public key PK(a) of thesemiconductor device 230 may be prestored in thestorage unit 242 of thesemiconductor device 240. In this case, Steps S132 and S133 can be skipped. - The
semiconductor device 240 transmits the encrypted unique code UC(z)_c to thedecryption unit 235 of the semiconductor device 230 (Step S135). Thedecryption unit 235 of thesemiconductor device 230 decrypts the encrypted unique code UC(z)_c by using the secret key SK(a) of thesemiconductor device 230 and thereby generates the unique code UC(z) (Step S136). - The correction
data generation unit 234 of thesemiconductor device 230 generates the correction data CD(z) using the unique code UC(z) of thesemiconductor device 240 and the common key CK(a) stored in the storage unit 232 (Step S137). For the correctiondata generation unit 234 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Steps S134 to S136 are repeated to acquire the unique code UC(z) a plurality of times. - The generated correction data CD(z) is transmitted to the common
key generation unit 243 of the semiconductor device 240 (Step S138). The commonkey generation unit 243 of thesemiconductor device 240 generates the common key CK(a) using the unique code UC(z) output from the uniquecode generation unit 241 and the correction data CD(z) output from the correction data generation unit 234 (Step S139). By the above process, the addedsemiconductor device 240 can have the common key CK(a). Thus, the added semiconductor device (ICz) 240 becomes able to perform cryptographic communication with the semiconductor device (ICa) 230 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S140). - As described above, in the cryptographic communication system according to this embodiment, the correction
data generation unit 234 of thesemiconductor device 230 generates the correction data CD(z) using the unique code UC(z) unique to thesemiconductor device 240 and the common key CK(a), and the commonkey generation unit 243 of thesemiconductor device 240 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of thesemiconductor device 240. There is thus no need to incorporate an expensive secure server into the cryptographic communication system in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, and it is possible to add the semiconductor device easily and at low cost to the cryptographic communication system in which secure communication is performed. - Further, in the cryptographic communication system according to this embodiment, because important data such as the common key CK(a) is not directly stored in the
storage units semiconductor device 230 and thesemiconductor device 240 are configured using general-purpose microcomputers with a relatively low security level, a high security level can be achieved. - Note that the correction data CD(a) used to generate the common key CK(a) in the
semiconductor device 230 and the secret key SK(a) of thesemiconductor device 230 are information with a relatively high security level, though the security level is lower than that of the common key CK(a). Thus, the security microcomputer may be used for thesemiconductor device 230 in which the correction data CD(a) and the secret key SK(a) are stored in order to prevent leakage of the correction data CD(a) and the secret key SK(a) to a third party. - Further, the correction data CD(z) that is transmitted from the
semiconductor device 230 to thesemiconductor device 240 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a). Thus, when transmitting the correction data CD(z) from thesemiconductor device 230 to thesemiconductor device 240, the correction data CD(z) may be encrypted before transmission using the public key cryptosystem. - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed. Particularly, in the cryptographic communication system according to this embodiment, the unique code UC(z) of the
semiconductor device 240 is encrypted and transmitted to thesemiconductor device 230, which further enhances the security of the cryptographic communication system. - A tenth embodiment of the present invention is described hereinafter.
Fig. 26 is a block diagram showing acryptographic communication system 203 according to this embodiment. In this embodiment, the cryptographic communication system is applied to a digital signature system. Thecryptographic communication system 203 according to this embodiment includes a semiconductor device ICa (250), a semiconductor device ICz (260), and asecure server 270. - The
semiconductor device 250 includes a uniquecode generation unit 251, astorage unit 252, a commonkey generation unit 253, a correctiondata generation unit 254, adecryption unit 255, and averification unit 256. - The unique
code generation unit 251 generates a unique code UC(a) that is unique to thesemiconductor device 250 and outputs it to the commonkey generation unit 253. The basic configuration and operation of the uniquecode generation unit 251 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 252 can store correction data CD(a), a public key PK(a) and a secret key SK(a) of thesemiconductor device 250, and a common key CK(a) generated in the commonkey generation unit 253. Thestorage unit 235 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(a), the public key PK(a) and the secret key SK(a) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 252 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 250 is powered off. - The common
key generation unit 253 generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 251 and correction data CD(a) stored in thestorage unit 252. The commonkey generation unit 253 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 253 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The correction
data generation unit 254 generates correction data CD(z) using a unique code UC(z) of thesemiconductor device 260 and the common key CK(a). The basic configuration and operation of the correctiondata generation unit 254 are the same as those of the correctiondata generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted. - The
decryption unit 255 decrypts the unique code UC(z)_c encrypted by anencryption unit 264 of thesemiconductor device 260 using the secret key SK(a) of thesemiconductor device 250 and thereby generates the unique code UC(z). - The
verification unit 256 executes a verification algorithm in the digital signature scheme. Specifically, theverification unit 256 generates verification data using signature data Sig(a) and a public key PK(z) of thesemiconductor device 260 and compares the verification data with plain text Plane(a). - The
semiconductor device 260 includes a uniquecode generation unit 261, astorage unit 262, a commonkey generation unit 263, anencryption unit 264, and a signaturedata generation unit 265. The uniquecode generation unit 261 generates a unique code UC(z) that is unique to thesemiconductor device 260 and outputs it to theencryption unit 264 and the commonkey generation unit 263. The basic configuration and operation of the uniquecode generation unit 261 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 262 can store a common key CK(a) generated in the commonkey generation unit 263, a secret key SK(z) of thesemiconductor device 260, and a plain text Plane(z). Thestorage unit 262 includes a volatile memory and a nonvolatile memory, for example, and the secret key SK(z) of thesemiconductor device 260 and the plain text Plane(z) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 262 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 260 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 260 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 263 generates the common key CK(a) using the unique code UC(z) output from the unique-code generation unit 261 and the correction data CD(z) output from the correctiondata generation unit 254. The commonkey generation unit 263 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 263 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The
encryption unit 264 encrypts the unique code UC(z) generated in the uniquecode generation unit 261 by using the public key PK(a) of thesemiconductor device 260. The public key PK(a) to be used for encryption may be transmitted from thesemiconductor device 250 to thesemiconductor device 260 in advance and stored in thestorage unit 262. Alternatively, the public key PK(a) to be used for encryption may be directly supplied from thesemiconductor device 250 to theencryption unit 264 at the time when theencryption unit 264 encrypts the unique code UC(z). Further alternatively, the public key PK(a) may be supplied from thesecure server 270. The encrypted unique code UC(z)_c is output to thedecryption unit 255 of thesemiconductor device 250. - The signature
data generation unit 265 generates signature data Sig(z) using the secret key SK(z) of thesemiconductor device 260 and the plain text Plane(z). In other words, the signaturedata generation unit 265 executes a signature generation algorithm in the digital signature scheme. - The
secure server 270 includes adatabase 271 that stores public keys PK(a), PK(b), ..., PK(z) of semiconductor devices ICa, ICb, ..., ICz in association with the semiconductor devices ICa, ICb, ..., ICz. In this embodiment, because the public key information stored in thedatabase 271 is information with a high security level, it is preferred to use a security microcomputer for thesecure server 270. The public key information stored in thesecure server 270 is transmitted to each semiconductor device in response to a request. - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 27 . First, the commonkey generation unit 253 of the semiconductor device ICa (250) generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 251 and the correction data CD(a) stored in the storage unit 252 (Step S141). Then, the semiconductor device ICa (250) starts communication with other semiconductor devices ICb to ICy (not shown) using the common key CK(a) (Step S142). - Next, the semiconductor device ICz (260) transmits semiconductor device information (for example, a unique ID etc.) of the semiconductor device ICz (260) to the semiconductor device ICa (250) (Step S143). Receiving the semiconductor device information of the
semiconductor device 260, thesemiconductor device 250 makes a request for transmission of a public key of thesemiconductor device 260 to the secure server 270 (Step S144). The public key of thesemiconductor device 260 is used when theverification unit 256 of thesemiconductor device 250 verifies signature data. Thesecure server 270 transmits the public key PK(z) of thesemiconductor device 260 to theverification unit 256 of the semiconductor device 250 (Step S145). - Then, the
semiconductor device 250 makes a request for transmission of signature data to the semiconductor device 260 (Step S146). Receiving the request for transmission of signature data, thesemiconductor device 260 generates signature data Sig(z) using the secret key SK(z) and the plain text Plane(z) in the signaturedata generation unit 265. The plain text Plane(z) and the generated signature data Sig(z) are transmitted to theverification unit 256 of the semiconductor device 250 (Step S147). - The
verification unit 256 of thesemiconductor device 250 executes a verification algorithm in the digital signature scheme (Step S148). Specifically, theverification unit 256 generates verification data using the public key PK(z) of thesemiconductor device 260 supplied from thesecure server 270 and the signature data Sig(z), and compares the verification data with the plain text Plane(z). The signature data Sig(z) is data generated by encrypting the plain text Plane(z) using the secret key SK(z) of thesemiconductor device 260. Thus, the verification data obtained by decrypting the signature data Sig(z) using the public key PK(z) of thesemiconductor device 260 is data corresponding to the plain text Plane(z) transmitted from thesemiconductor device 260. Therefore, theverification unit 256 compares the verification data with the plain text Plane(z) and, when the verification data and the plain text Plane(z) match, it can be determined that thesemiconductor device 260 has the secret key SK(z). - Thus, when the verification data and the plain text Plane(z) match (when the verification algorithm accepts the signature data Sig(z)), the
verification unit 256 determines that the signature data Sig(z) created by thesemiconductor device 260 is valid. Thus, it is determined that thesemiconductor device 260 has the secret key SK(z). On the other hand, when the verification data and the plain text Plane(z) do not match (when the verification algorithm rejects the signature data Sig(z)), theverification unit 256 determines that the signature data Sig(z) created by thesemiconductor device 260 is invalid. - When the
semiconductor device 260 is determined as a proper semiconductor device, thesemiconductor device 250 transmits the public key PK(a) of thesemiconductor device 250 to the semiconductor device 260 (Step S149). Theencryption unit 264 of thesemiconductor device 260 encrypts the unique code UC(z) by using the public key PK(a) of the semiconductor device 250 (Step S150). Note that the public key PK(a) of thesemiconductor device 250 may be transmitted from thesecure server 270 to thesemiconductor device 260 by an instruction from thesemiconductor device 250. - The
semiconductor device 260 transmits the encrypted unique code UC(z)_c to thedecryption unit 255 of the semiconductor device 250 (Step S151). Thedecryption unit 255 of thesemiconductor device 250 decrypts the encrypted unique code UC(z)_c by using the secret key SK(a) of thesemiconductor device 250 and thereby generates the unique code UC(z) (Step S152). - The correction
data generation unit 254 of thesemiconductor device 250 generates the correction data CD(z) using the unique code UC(z) of thesemiconductor device 260 and the common key CK(a) (Step S153). For the correctiondata generation unit 254 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Steps S150 to S152 are repeated to acquire the unique code UC(z) a plurality of times. - The generated correction data CD(z) is transmitted to the common
key generation unit 263 of the semiconductor device 260 (Step S154). The commonkey generation unit 263 of thesemiconductor device 260 generates the common key CK(a) using the unique code UC(z) output from the uniquecode generation unit 261 and the correction data CD(z) output from the correction data generation unit 254 (Step S155). By the above process, the addedsemiconductor device 260 can be verified using the digital signature scheme. Then, when the addedsemiconductor device 260 is a proper semiconductor device, thesemiconductor device 260 can have the common key CK(a). Thus, the added semiconductor device (ICz) 260 becomes able to perform cryptographic communication with the semiconductor device (ICa) 240 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S156). - As described above, in the cryptographic communication system according to this embodiment, the correction
data generation unit 254 of thesemiconductor device 250 generates the correction data CD(z) using the unique code L3C(z) unique to thesemiconductor device 260 and the common key CK(a), and the commonkey generation unit 263 of thesemiconductor device 260 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of thesemiconductor device 260. There is thus no need to incorporate an expensive secure server into the cryptographic communication system in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, and it is possible to add the semiconductor device easily and at low cost to the cryptographic communication system in which secure communication is performed. - Further, in the cryptographic communication system according to this embodiment, because important data such as the common key CIS(a) is not directly stored in the
storage units semiconductor device 250 and thesemiconductor device 260 are configured using general-purpose microcomputers with a relatively low security level, a high security level can be achieved. - On the other hand, in this embodiment, the public key information stored in the
database 271 of thesecure server 270 is information with a high security level. It is thus preferred to use a security microcomputer for thesecure server 270. - Note that the correction data CD(a) used to generate the common key CK(a) and the secret key SK(z) of the
semiconductor device 260 are information with a relatively high security level, though the security level is lower than that of the common key CK(a). Thus, the security microcomputer may be used for thesemiconductor devices - Further, the correction data CD(z) that is transmitted from the
semiconductor device 250 to thesemiconductor device 260 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a). Thus, when transmitting the correction data CD(z) from thesemiconductor device 250 to thesemiconductor device 260, the correction data CD(z) may be encrypted before transmission using the public key cryptosystem. - Further, in this embodiment, the
encryption unit 264 is included in thesemiconductor device 260 and thedecryption unit 255 is included in thesemiconductor device 250 in order to transmit the unique code UC(z) after encryption. However, in this embodiment, theencryption unit 264 and thedecryption unit 255 may be omitted and the unique code UC(z) may be transmitted without encryption as in the eighth embodiment. - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- Particularly, in the cryptographic communication system according to this embodiment the public key information is collectively managed using the
secure server 270. The public key information is information that is used when verifying a semiconductor device to be added using the digital signature scheme, and it is information with a high security level. By collectively managing the information with a high security level using thesecure server 270, the need to store the information with a high security level in thesemiconductor devices semiconductor devices - An eleventh embodiment of the present invention is described hereinafter.
Fig. 28 is a block diagram showing acryptographic communication system 204 according to this embodiment. In thecryptographic communication system 204 according to this embodiment, a correction data generation program PRG(z) is transmitted from a semiconductor device ICz (290), which is a device to be added, to a semiconductor device ICa (280) rather than including a correction data generation unit for generating correction data CD(z). The correction data generation program PRG(z) is then executed in the semiconductor device ICa (280) to thereby generate the correction data Gi7 (z) . - The
cryptographic communication system 204 shown inFig. 28 includes a semiconductor device ICa (280) and a semiconductor device ICz (290). Thesemiconductor device 280 includes a uniquecode generation unit 281, astorage unit 282, a commonkey generation unit 283, aprogram execution unit 284, and adecryption unit 285. - The unique
code generation unit 281 generates a unique code UC(a) that is unique to thesemiconductor device 280 and outputs it to the commonkey generation unit 283. The basic configuration and operation of the uniquecode generation unit 281 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 282 can store correction data CD(a), a public key PK(a) and a secret key SK(a) of thesemiconductor device 280, and a common key CK(a) generated in the commonkey generation unit 283. Thestorage unit 282 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(a), the public key PK(a) and the secret key SK(a) are stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 282 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 280 is powered off. - The common
key generation unit 283 generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 281 and correction data CD(a) stored in thestorage unit 282. The commonkey generation unit 283 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 283 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The
program execution unit 284 executes the correction data generation program PRG(z) transmitted from thesemiconductor device 290. By executing the correction data generation program PRG(z), the correction data CD(z) can be generated using the unique code UC(z) of thesemiconductor device 290 and the common key CK(a). Theprogram execution unit 284 is typically a processor such as a CPU. The correction data generation program PRG(z) may be a program that can run only on thesemiconductor device 280, for example. Alternatively, the correction data generation program PRG(z) may be a program such as JAVA (registered trademark) that does not depend on the architecture of a semiconductor device on which it runs. Some semiconductor devices constituting the cryptographic communication system have different CPU core architectures. Thus, by using a program such as JAVA that is not dependent on the architecture of a semiconductor device on which it runs, it is possible to improve the convenience of the cryptographic communication system and reduce the cost of the cryptographic communication system. - Note that a process of generating the correction data CD(z) using the correction data generation program PRG(z) is the same as the process in the correction
data generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted. - The
decryption unit 285 decrypts the unique code UC(z)_c encrypted by anencryption unit 294 of thesemiconductor device 290 using the secret key SK(a) of thesemiconductor device 280 and thereby generates the unique code UC(z). - The
semiconductor device 290 includes a uniquecode generation unit 291, astorage unit 292, a commonkey generation unit 293, and an encryption unit 249. The uniquecode generation unit 291 generates a unique code UC(z) unique to thesemiconductor device 290 and outputs it to theencryption unit 294 and the commonkey generation unit 293. The basic configuration and operation of the uniquecode generation unit 291 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 292 can have the common key CK(a) generated in the commonkey generation unit 293 and the correction data generation program PRG(z). Thestorage unit 292 includes a volatile memory and a nonvolatile memory, for example, and the correction data generation program PRG(z) is stored in the nonvolatile memory, and the common key CK(a) is stored in the volatile memory. Thus, although thestorage unit 292 temporarily stores the common key CK(a), information of the common key CK(a) is erased when thesemiconductor device 290 is powered off. Note that the common key CK(a) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 290 may be done on the common key CK(a) stored in the nonvolatile memory. - The common
key generation unit 293 generates the common key CK(a) using the unique code UC(z) output from the uniquecode generation unit 291 and the correction data CD(z) output from theprogram execution unit 284. The commonkey generation unit 293 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 293 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The
encryption unit 294 encrypts the unique code UC(z) and the correction data generation program PRG(z) by using the public key PK(a) of thesemiconductor device 280. The public key PK(a) to be used for encryption may be transmitted from thesemiconductor device 280 to thesemiconductor device 290 in advance and stored in thestorage unit 292. Alternatively, the public key PK(a) to be used for encryption may be directly supplied from thesemiconductor device 280 to theencryption unit 294 at the time when theencryption unit 294 encrypts the unique code UC(z) and the correction data generation program PRG(z). The encrypted unique code UC(z)_c and correction data generation program PRG(z) are output to thedecryption unit 285 of thesemiconductor device 280. - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 29 . First, the commonkey generation unit 283 of the semiconductor device ICa (280) generates the common key CK(a) using the unique code UC(a) output from the uniquecode generation unit 281 and the correction data CD(a) stored in the storage unit 282 (Step S160). Then, the semiconductor device ICa (280) starts communication with other semiconductor devices ICb to ICy (not shown) using the common key CK(a) (Step S161). - Then, the semiconductor device ICz (290) makes a request for transmission of the correction data CD(z) to the semiconductor device ICa (280) (Step S162). Receiving the request for transmission of the correction data CD(z), the
semiconductor device 280 transmits the public key PK(a) of thesemiconductor device 280 to the semiconductor device 290 (Step S163). Theencryption unit 294 of thesemiconductor device 290 encrypts the unique code UC(z) and the correction data generation program PRG(z) using the public key PK(a) of the semiconductor device 280 (Step S164).Note that the public key PK(a) of thesemiconductor device 280 may be prestored in thestorage unit 292 of thesemiconductor device 290. In this case, Steps S162 and S163 can be skipped. - The
semiconductor device 290 transmits the encrypted unique code UC(z)_c and correction data generation program PRG(z)_c to thedecryption unit 285 of the semiconductor device 280 (Step 5165). Thedecryption unit 285 of thesemiconductor device 280 decrypts the encrypted unique code UC(z)_c and correction data generation program PRG(z)_c by using the secret key SK(a) of thesemiconductor device 280 and thereby generates the unique code UC(z) and the correction data generation program PRG(z) (Step S166). - The
program execution unit 284 of thesemiconductor device 280 executes the correction data generation program PRG(z) decrypted in thedecryption unit 285. By executing the correction data generation program PRG(z), the correction data CD(z) can be generated using the unique code UC(z) of thesemiconductor device 290 and the common key CK(a) (Step S167). For the correction data generation program PRG(z) to generate the correction data C17(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Steps S164 to S166 (excluding transmission of the correction data generation program PRG(z)) are repeated to acquire the unique code UC(z) a plurality of times. Further, the correction data generation program PRG(z) may be deleted after the correction data CD(z) is generated. - The generated correction data CD(z) is transmitted to the common
key generation unit 293 of the semiconductor device 290 (Step S168). The commonkey generation unit 293 of thesemiconductor device 290 generates the common key CK(a) using the unique code UC(z) output from the uniquecode generation unit 291 and the correction data CD(z) output from the program execution unit 284 (Step S169). By the above process, the addedsemiconductor device 290 can have the common key CK(a). Thus, the added semiconductor device (ICz) 290 becomes able to perform cryptographic communication with the semiconductor device (ICa) 280 and the other semiconductor devices ICb to ICy using the common key CK(a) (Step S170). - As described above, in the cryptographic communication system according to this embodiment, the
program execution unit 284 of thesemiconductor device 280 generates the correction data CD(z) using the unique code UC(z) unique to thesemiconductor device 290 and the common key CK(a), and the commonkey generation unit 293 of thesemiconductor device 290 generates the common key CK(a) using the correction data CD(z) and the unique code UC(z) of thesemiconductor device 290. There is thus no need to incorporate an expensive secure server into the cryptographic communication system in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, and it is possible to add the semiconductor device easily and at low cost to the cryptographic communication system in which secure communication is performed. - Further, in the cryptographic communication system according to this embodiment, because important data such as the common key CK(a) is not directly stored in the
storage units semiconductor device 280 and thesemiconductor device 290 are configured using general-purpose microcomputers with a relatively low security level, a high security level can be achieved. - Note that the correction data CD(a) used to generate the common key CK(a) in the
semiconductor device 280 and the secret key SK(a) of thesemiconductor device 280 are information with a relatively high security level, though the security level is lower than that of the common key CK(a). Thus, the security microcomputer may be used for thesemiconductor device 280 in which the correction data CD(a) and the secret key SK(a) are stored in order to prevent leakage of the correction data CD(a) and the secret key SK(a) to a third party. - Further, the correction data CD(z) that is transmitted from the
semiconductor device 280 to thesemiconductor device 290 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(a). Thus, when transmitting the correction data CD(z) from thesemiconductor device 280 to thesemiconductor device 290, the correction data CD(z) may be encrypted before transmission using the public key cryptosystem. - Further, in this embodiment, the
encryption unit 294 is included in thesemiconductor device 290 and the decryption
unit 285 is included in thesemiconductor device 280 in order to transmit the unique code UC(z) and the correction data generation program PRG(z) after encryption. However, in this embodiment, theencryption unit 294 and the decryption unit. 285 may be omitted, and the unique code UC(z) and the correction data generation program PRG(z) may be transmitted without encryption as in the eighth embodiment. - In the above example, the case where the correction data generation program PRG(z) is transmitted to the
semiconductor device 280 from thesemiconductor device 290 to be added is described. However, the correction data generation program PRG(z) may be transmitted to thesemiconductor device 280 from a server, for example. - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- Particularly, in the cryptographic communication system according to this embodiment, even when the correction data generation unit is not included in advance in the
semiconductor device 280, the unique code UC(z) can be generated by storing the correction data generation program PRG(z) into thesemiconductor device 290 to be added and
executing the correction data generation program PRG(z) in thesemiconductor device 280. The correction data generation program PRG(z) may be stored before shipping of thesemiconductor device 290 or may be downloaded from a server after shipping according to need. Further, if the correction data generation program PRG(z) is a program such as JAVA that is not dependent on the architecture of a semiconductor device on which it runs, it is possible to improve the convenience of the cryptographic communication system and reduce the cost of the cryptographic communication system. - A twelfth embodiment of the present invention is described hereinafter.
Fig. 30 is a block diagram showing acryptographic communication system 205 according to this embodiment. In thecryptographic communication system 205 according to this embodiment, a plurality of common keys CK(1) and CK(2) are generated in a commonkey generation unit 303 of a semiconductor device ICa (300). Then, the semiconductor device ICa (300) and a semiconductor device ICz (310) communicate using the common key CK(2), and the semiconductor device ICa (300) and semiconductor devices ICb to ICy communicate using the common key CK(1). Thus, the semiconductor device ICa (300) functions as a router. - The
cryptographic communication system 205 shown inFig. 30 includes the semiconductor device ICa (300) and the semiconductor device ICz (310). Thesemiconductor device 300 includes a uniquecode generation unit 301, astorage unit 302, a commonkey generation unit 303, and a correctiondata generation unit 304. - The unique
code generation unit 301 generates a unique code UC(a) unique to thesemiconductor device 300 and outputs it to the commonkey generation unit 303. The basic configuration and operation of the uniquecode generation unit 301 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 302 can store correction data CD(1) and CD(2) and common keys CK(1) and CK(2) generated in the commonkey generation unit 303. Thestorage unit 302 includes a volatile memory and a nonvolatile memory, for example, and the correction data CD(1) and CD(2) are stored in the nonvolatile memory, and the common keys CK(1) and CK(2) are stored in the volatile memory. Thus, although thestorage unit 302 temporarily stores the common keys CK(1) and CK(2), information of the common keys CK(1) and CK(2) is erased when thesemiconductor device 300 is powered off. Note that the common keys CK(1) and CK(2) may be stored in the nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 300 may be done on the common keys CK(1) and CK(2) stored in the nonvolatile memory. - The common
key generation unit 303 generates the common key (second common key) CK(1) using the unique code UC(a) output from the uniquecode generation unit 301 and correction data (third correction data) CD(1) stored in thestorage unit 302. Further, the commonkey generation unit 303 generates the common key (first common key) CK(2) using the unique code UC(a) output from the uniquecode generation unit 301 and correction data (first correction data) CD(2) stored in thestorage unit 302. The commonkey generation unit 303 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 303 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - The correction
data generation unit 304 generates correction data (second correction data) CD(z) using the unique code UC(z) of thesemiconductor device 310 and the common key CK(2). The basic configuration and operation of the correctiondata generation unit 304 are the same as those of the correctiondata generation unit 214 described in the eighth embodiment and redundant explanation thereof is omitted. - The
semiconductor device 310 includes a uniquecode generation unit 311, astorage unit 312, and a commonkey generation unit 313. The uniquecode generation unit 311 generates a unique code UC(a) unique to thesemiconductor device 310 and outputs it to the correctiondata generation unit 304 of thesemiconductor device 300. The basic configuration and operation of the uniquecode generation unit 311 are the same as those of the uniquecode generation unit 211 described in the eighth embodiment and redundant explanation thereof is omitted. - The
storage unit 312 can have the common key CK(2) generated in the commonkey generation unit 313. Thestorage unit 312 stores the common key CK(2) in a volatile memory. Thus, although thestorage unit 312 temporarily stores the common key CK(2), information of the common key CK(2) is erased when thesemiconductor device 310 is powered off. Note that the common key CK(2) may be stored in a nonvolatile memory according to need after taking security measures such as encryption, and measures such as erasing data by writing at power-off of thesemiconductor device 310 may be done on the common key CK(2) stored in the nonvolatile memory. - The common
key generation unit 313 generates the common key CK(2) using the unique code UC(z) output from the uniquecode generation unit 311 and the correction data CD(z) output from the correctiondata generation unit 304. The commonkey generation unit 313 functions as a unique code correction unit. The basic configuration and operation of the commonkey generation unit 313 are the same as those of the commonkey generation unit 213 described in the eighth embodiment and redundant explanation thereof is omitted. - An operation of the cryptographic communication system according to this embodiment is described hereinafter with reference to the flowchart of
Fig. 31 . First, the commonkey generation unit 303 of the semiconductor device ICa (300) generates the common key CK(1) using the unique code UC(a) output from the uniquecode generation unit 301 and the correction data CD(1) stored in the storage unit 302 (Step S171). Then, the semiconductor device ICa (300) starts communication with other semiconductor devices ICb to ICy (third semiconductor device) using the common key CK(1) (Step S172). - The
semiconductor device 310 transmits the unique code UC(z) of thesemiconductor device 310 to the correctiondata generation unit 304 of the semiconductor device 300 (Step S173). The commonkey generation unit 303 of thesemiconductor device 300 generates the common key CK(2) using the unique code UC(a) output from the uniquecode generation unit 301 and the correction data CD(2) stored in the storage unit 302 (Step S174). Then, the correctiondata generation unit 304 of thesemiconductor device 300 generates the correction data CD(z) using the unique code UC(z) of thesemiconductor device 310 and the common key CK(2) (Step S175). For the correctiondata generation unit 304 to generate the correction data CD(z), it is necessary to acquire the unique code UC(z) a plurality of times. Thus, Step S173 is repeated to acquire the unique code UC(z) a plurality of times. - The generated correction data CD(z) is transmitted to the common
key generation unit 313 of the semiconductor device 310 (Step S176). The commonkey generation unit 313 of thesemiconductor device 310 generates the common key CK(2) using the unique code UC(z) output from the uniquecode generation unit 311 and the correction data CD(z) output from the correction data generation unit 304 (Step S177). By the above process, both of thesemiconductor device 300 and thesemiconductor device 310 can have the common key CK(2). Thus, the addedsemiconductor device 310 becomes able to perform cryptographic communication with thesemiconductor device 300 using the common key CK(2) (Step S178). On the other hand, thesemiconductor device 300 and the semiconductor devices ICb to ICy peform communication using the common key CK(1). -
Fig. 32 is a block diagram showing an example of a configuration of the cryptographic communication system according to this embodiment. As shown inFig. 32 , the semiconductor device ICa and the semiconductor devices ICb and ICc communicate using the common key CK(1) and establish a secure network. Further, the added semiconductor device ICz communicates with the semiconductor device ICa using the common key CK(2). Thus, the semiconductor device ICa functions as a router, so that the added semiconductor device ICz can perform cryptographic communication with the semiconductor devices ICb and ICc through the semiconductor device ICa. - As described above, in the cryptographic communication system according to this embodiment, the correction
data generation unit 304 of the semiconductor device 400 generates the correction data CD(z) using the unique code UC(z) unique to thesemiconductor device 310 and the common key CK(2), and the commonkey generation unit 313 of thesemiconductor device 310 generates the common key CK(2) using the correction data CD(z) and the unique code UC(z) of thesemiconductor device 310. There is thus no need to incorporate an expensive secure server into the cryptographic communication system in order to verify whether the semiconductor device ICz to be added is a proper semiconductor device, and it is possible to add the semiconductor device easily and at low cost to the cryptographic communication system in which secure communication is performed. - Further, in the cryptographic communication system according to this embodiment, because important data such as the common keys CK(1) and CK(2) is not directly stored in the
storage units semiconductor device 300 and thesemiconductor device 310 are configured using general-purpose microcomputers with a relatively low security level, a high security level can be achieved. - Note that the correction data CD(1) and CD(2) used to generate the common keys CK(1) and CK(2) are information with a relatively high security level, though the security level is lower than that of the common keys CK(1) and CK(2). Thus, the security microcomputer may be used for the
semiconductor device 300 in which the correction data CD(1) and CD(2) are stored in order to prevent leakage of the correction data CD(1) and CD(2) to a third party. - Further, the correction data CD(z) that is transmitted from the
semiconductor device 300 to thesemiconductor device 310 is information with a relatively high security level because it is related data to the unique code UC(z) and the common key CK(2). Thus, when transmitting the correction data CD(z) from thesemiconductor device 300 to thesemiconductor device 310, the correction data CD(z) may be encrypted before transmission using the public key cryptosystem. - As described above, according to the embodiment of the present invention, it is possible to provide the cryptographic communication system and the cryptographic communication method that can easily add a semiconductor device to the cryptographic communication system in which secure communication is performed.
- A thirteenth embodiment of the present invention is described hereinafter.
Fig. 33 is a block diagram showing a case where the cryptographic communication system according to the eighth to twelfth embodiment is applied to a vehicle-mounted semiconductor device. As shown inFig. 33 , avehicle 360 includes agateway unit 350, a faultdiagnostic unit 351, anengine control unit 352, abrake control unit 353, alamp control unit 354, a doorlock control unit 355, and a keyinsertion control unit 356. - The
gateway unit 350 is equipment for relaying a network composed of theunits 351 to 356. A secure microcomputer ICa is included in thegateway unit 350. The faultdiagnostic unit 351 is a unit for making a diagnosis whether the components of thevehicle 360 are at fault. A semiconductor device ICb is included in the faultdiagnostic unit 351. Theengine control unit 352 is a unit for making electrical control (fuel supply, ignition timing control etc.) of engine operation in a comprehensive manner. A semiconductor device ICc is included in theengine control unit 352. Thebrake control unit 353 is a unit for controlling a brake such as ABS (Antilock Brake System). A semiconductor device ICd is included in thebrake control unit 353. Thelamp control unit 354 is a unit for controlling a headlight, winker and the like of the vehicle. A semiconductor device ICe is included in thelamp control unit 354. - The door
lock control unit 355 is a unit for controlling door lock. A semiconductor device ICf and a communication unit for radio communication with a key 357 are included in the doorlock control unit 355. The keyinsertion control unit 356 is a unit for determining whether the inserted key is a valid user key or not. A semiconductor device ICg and a communication unit for radio communication with the key 357 are included in the keyinsertion control unit 356. A semiconductor device ICh and a communication unit are included in the key 357. General-purpose microcomputers, for example, may be used for the semiconductor devices ICb to ICh that are included in therespective units 351 to 356 and the key 357. - The fault
diagnostic unit 351, theengine control unit 352, thebrake control unit 353, thelamp control unit 354, the doorlock control unit 355 and the keyinsertion control unit 356 are connected to thegateway unit 350, and therespective units 351 to 356 are configured to be able to communicate with one another through thegateway unit 350. The common key that is used for communication between therespective units 351 to 356 and thegateway unit 350 may differ from unit to unit. For example, a common key A may be used for communication between the faultdiagnostic unit 351 and thegateway unit 350, and a common key B may be used for communication between theengine control unit 352 and thegateway unit 350. - The gateway unit (ICa) 350 and the respective units (ICb to ICg) 351 to 356 establish a secure network. When adding a
car navigation system 358 that includes a semiconductor device ICz to the secure network, use of the method described in the eighth to twelfth embodiments allows the car navigation system (ICz) 358 to be added to the secure network easily and at low cost. - In the example shown in
Fig. 33 , the configuration in which theunits 351 to 356 and thecar navigation system 358 perform communication through thegateway unit 350 is shown. However, theunits 351 to 356 and thecar navigation system 358 may communicate with one another using the same common key. In this case, theunits 351 to 356 and thecar navigation system 358 are configured to be connected to one another through a common bus, for example. It is further applicable to communication between various units different from the units shown inFig. 33 . - It should be noted that the case where the cryptographic communication system according to the first to sixth embodiments and the eighth to twelfth embodiments is applied to a vehicle-mounted semiconductor device is described in this embodiment. However, the cryptographic communication system according to the first to sixth embodiments and the eighth to twelfth embodiments may be applied also to a typical LAN, smart meter, smart grid, contactless IC card and the like, not limited to a vehicle-mounted semiconductor device. The semiconductor devices that constitute the cryptographic communication system may communicate with one another via wired or wireless connections. Further, the first to thirteenth embodiments can be combined as desirable by one of ordinary skill in the art.
- While the invention has been described in terms of several embodiments, those skilled in the art will recognize that the invention can be practiced with various modifications within the spirit and scope of the appended claims and the invention is not limited to the examples described above.
- Further, the scope of the claims is not limited by the embodiments described above.
- Furthermore, it is noted that, Applicant's intent is to encompass equivalents of all claim elements, even if amended later during prosecution.
Claims (57)
- A cryptographic communication system including a first semiconductor device and a second semiconductor device,
the first semiconductor device comprising:a common key generation unit that generates a common key by using a first unique code having a value unique to the first semiconductor device and containing a random error and first correction data for correcting the first unique code; andan encryption unit that encrypts the common key generated in the common key generation unit by using a public key of the second semiconductor device, andthe second semiconductor device comprising:a secret key generation unit that generates a secret key of the second semiconductor device by using a second unique code having a value unique to the second semiconductor device and containing a random error and second correction data for correcting the second unique code; anda decryption unit that decrypts the common key encrypted in the encryption unit by using the secret key. - The cryptographic communication system according to Claim 1, wherein the first semiconductor device and the second semiconductor device communicate using the common key.
- The cryptographic communication system according to Claim 1 or 2, wherein the first correction data includes mask data for masking a bit with a high error rate among bits of the first unique code, and an error correction code for correcting a bit with a low error rate among bits of the first unique code.
- The cryptographic communication system according to Claim 3, wherein the first correction data further includes an operation parameter for performing a specified operation on the first unique code error-corrected using the mask data and the error correction code.
- The cryptographic communication system according to Claim 4, wherein the common key generation unit masks the first unique code using the mask data, corrects an error of the masked first unique code using the error correction code, and performs an operation on the first unique code error-corrected using the mask data and the error correction code by using the operation parameter.
- The cryptographic communication system according to any one of Claims 1 to 5, wherein the first and second semiconductor devices are configured using secure microcomputers.
- The cryptographic communication system according to any one of Claims 1 to 5, wherein the first and second semiconductor devices are configured using general-purpose microcomputers.
- The cryptographic communication system according to any one of Claims 1 to 7, wherein the first and second semiconductor devices are vehicle-mounted microcomputers.
- The cryptographic communication system according to Claim 8, wherein one of the first and second semiconductor devices is a fault diagnostic unit.
- The cryptographic communication system according to Claim 8, wherein one of the first and second semiconductor devices is a car navigation system.
- A cryptographic communication system including a first semiconductor device and a second semiconductor device,
the first semiconductor device comprising:a secret key generation unit that generates a secret key of the first semiconductor device by using a first unique code having a value unique to the first semiconductor device and containing a random error and first correction data for correcting the first unique code; anda signature data generation unit that generates signature data by using the secret key and a plain text, andthe second semiconductor device comprising:a verification unit that generates verification data by using the signature data and a public key of the first semiconductor device and compares the verification data with the plain text. - The cryptographic communication system according to Claim 11, wherein the second semiconductor device comprises:a public key generation unit that generates a public key of the first semiconductor device by using a second unique code having a value unique to the second semiconductor device and containing a random error and second correction data for correcting the second unique code.
- The cryptographic communication system according to Claim 11 or 12, wherein the first correction data includes mask data for masking a bit with a high error rate among bits of the first unique code, and an error correction code for correcting a bit with a low error rate among bits of the first unique code.
- The cryptographic communication system according to Claim 13, wherein the first correction data further includes an operation parameter for performing a specified operation on the first unique code error-corrected using the mask data and the error correction code.
- The cryptographic communication system according to Claim 14, wherein the secret key generation unit masks the first unique code using the mask data, corrects an error of the masked first unique code using the error correction code, and performs an operation on the first unique code error-corrected using the mask data and the error correction code by using the operation parameter.
- The cryptographic communication system according to any one of Claims 11 to 15, wherein the first and second semiconductor devices are configured using secure microcomputers.
- The cryptographic communication system according to
any one of Claims 11 to 15, wherein the first and second semiconductor devices are configured using general-purpose microcomputers. - The cryptographic communication system according to any one of Claims 11 to 17, wherein the first and second semiconductor devices are vehicle-mounted microcomputers.
- The cryptographic communication system according to Claim 18, wherein one of the first and second semiconductor devices is a fault diagnostic unit.
- The cryptographic communication system according to Claim 18, wherein one of the first and second semiconductor devices is a car navigation system.
- A cryptographic communication system including first to third semiconductor devices, wherein
the third semiconductor device is configured to supply first correction data for correcting a first unique code to the first semiconductor device and supply second correction data for correcting a second unique code to the second semiconductor device,
the first semiconductor device includes a first common key generation unit that generates a common key by using a first unique code having a value unique to the first semiconductor device and containing a random error and the first correction data supplied from the third semiconductor device, and
the second semiconductor device includes a second common key generation unit that generates a common key by using a second unique code having a value unique to the second semiconductor device and containing a random error and the second correction data supplied from the third semiconductor device. - The cryptographic communication system according to
Claim 21, wherein the third semiconductor device includes a database that stores correction data associated with
respective semiconductor devices and commons keys generated in the respective semiconductor device. - The cryptographic communication system according to Claim 21, wherein the third semiconductor device includes a correction data generation unit that generates the first correction data by using a common key and a first unique code having a value unique to the first semiconductor device and containing a random error, and generates the second correction data by using the common key and a second unique code having a value unique to the second semiconductor device and containing a random error.
- The cryptographic communication system according to Claim 21, wherein
the third semiconductor device includes a correction data generation unit that generates the first correction data by using a first common key and a first unique code having a value unique to the first semiconductor device and containing a random error, and generates the second correction data by using a second common key and a second unique code having a value unique to the second semiconductor device and containing a random error,
the first common key generation unit included in the first semiconductor device generates the first common key,
the second common key generation unit included in the second semiconductor device generates the second common key,
the first semiconductor device and the third semiconductor device communicate using the first common key, and
the second semiconductor device and the third semiconductor device communicate using the second common key. - The cryptographic communication system according to any one of Claims 21 to 24, wherein the first correction data is supplied to the first semiconductor device in an encrypted state, and the second correction data is supplied to the second semiconductor device in an encrypted state.
- The cryptographic communication system according to Claim 23 or 24, wherein the correction data generation unit
acquires the first unique code a plurality of times, generates mask data for masking a bit with a high error rate among bits of the acquired first unique code, and generates an error correction code for correcting a bit with a low error rate among bits of the acquired first unique code. - The cryptographic communication system according to Claim 26, wherein the correction data generation unit further generates an operation parameter by using the common key and the first unique code error-corrected using the mask data and the error correction code.
- The cryptographic communication system according to any one of Claims 21 to 27, wherein
the third semiconductor device is configured using a secure microcomputer, and
the first and second semiconductor devices are configured using general-purpose microcomputers. - The cryptographic communication system according to any one of Claims 21 to 28, wherein the first to third semiconductor devices are vehicle-mounted microcomputers.
- The cryptographic communication system according to Claim 24, wherein
the first and second semiconductor devices are vehicle-mounted microcomputers,
the third semiconductor device is a gateway unit, and
the first and second semiconductor devices communicate through the gateway unit. - The cryptographic communication system according to Claim 29 or 30, wherein one of the first and second semiconductor devices is a fault diagnostic unit.
- The cryptographic communication system according to Claim 29 or 30, wherein one of the first and second semiconductor devices is a car navigation system.
- A cryptographic communication method using a first semiconductor device and a second semiconductor device, comprising:in the first semiconductor device,generating a common key by using a first unique code having a value unique to the first semiconductor device and containing a random error and first correction data for correcting the first unique code;encrypting the generated common key by using a public key of the second semiconductor device; andin the second semiconductor device,
generating a secret key of the second semiconductor device by using a second unique code having a value unique to the second semiconductor device and containing a random error and second correction data for correcting the second unique code; and
decrypting the encrypted common key by using the secret key. - A cryptographic communication method using a first semiconductor device and a second semiconductor device, comprising:in the first semiconductor device,generating a secret key of the first semiconductor device by using a first unique code having a value unique to the first semiconductor device and containing a random error and first correction data for correcting the first unique code;generating signature data by using the secret key and a plain text; andin the second semiconductor device,generating verification data by using the signature data and a public key of the first semiconductor device, and comparing the verification data with the plain text.
- A cryptographic communication method using first to third semiconductor devices, comprising:transmitting first correction data for correcting a first unique code from the third semiconductor device to the first semiconductor device;generating a common key in the first semiconductor device by using a first unique code having a value unique to the first semiconductor device and containing a random error and the first correction data supplied from the third semiconductor device;transmitting second correction data for correcting a second unique code from the third semiconductor device to the second semiconductor device; andgenerating a common key in the second semiconductor device by using a second unique code having a value unique to the second semiconductor device and containing a random error and the second correction data supplied from the third semiconductor device.
- A cryptographic communication system including a first semiconductor device and a second semiconductor device,
the first semiconductor device comprising:a first common key generation unit that generates a first common key by using a first unique code having a value unique to the first semiconductor device and containing a random error and first correction data for correcting the first unique code; anda correction data generation unit that generates second correction data for correcting a second unique code by using the first common key generated in the first common key generation unit and a second unique code having a value unique to the second semiconductor device and containing a random error, andthe second semiconductor device comprising:a second common key generation unit that generates the first common key by using the second unique code and the second correction data. - The cryptographic communication system according to Claim 36, wherein
the second semiconductor device further includes an encryption unit that encrypts the second unique code by using a public key of the first semiconductor device, and
the first semiconductor device further includes a decryption unit that decrypts the second unique code encrypted in the encryption unit by using a secret key of the first semiconductor device. - The cryptographic communication system according to Claim 36 or 37, wherein
the cryptographic communication system further includes a server including a database that stores public keys of
respective semiconductor devices in association with the respective semiconductor devices,
the second semiconductor device generates signature data by using a secret key of the second semiconductor device and a plain text, and
the first semiconductor device further includes a verification unit that generates verification data by using the signature data of the second semiconductor device and a public key of the second semiconductor device transmitted from the server, and compares the verification data with the plain text. - The cryptographic communication system according to Claim 37, wherein
the encryption unit included in the second semiconductor device further encrypts a correction data generation program for generating second correction data using the first common key generated in the first common key generation unit and the second unique code by using the public key of the first semiconductor device,
the decryption unit included in the first semiconductor device further decrypts the encrypted correction data generation program by using the secret key of the first semiconductor device, and
the first semiconductor device executes the decrypted correction data generation program and generates the second correction data by using the first common key and the second unique code. - The cryptographic communication system according to any one of Claims 36 to 39, wherein the first semiconductor device and the second semiconductor device communicate using the first common key.
- The cryptographic communication system according to Claim 40, wherein
the first common key generation unit further generates a second common key by using the first unique code unique to the first semiconductor device and third correction data, and
the first semiconductor device communicates with the third semiconductor device using the second common key, and
the second semiconductor device communicates with the third semiconductor device through the first semiconductor device. - The cryptographic communication system according to any one of Claims 36 to 41, wherein the first correction data includes first mask data for masking a bit with a high error rate among bits of the first unique code, and a first error correction code for correcting a bit with a low error rate
among bits of the first unique code. - The cryptographic communication system according to Claim 42, wherein the first correction data further includes a first operation parameter for performing a specified operation on the first unique code error-corrected using the first mask data and the first error correction code.
- The cryptographic communication system according to Claim 43, wherein the first common key generation unit masks the first unique code using the first mask data, corrects an error of the masked first unique code using the first error correction code, and performs an operation on the first unique code error-corrected using the first mask data and the first error correction code by using the first operation parameter.
- The cryptographic communication system according to any one of Claims 36 to 44, wherein the second correction data is transmitted from the first semiconductor device to the second semiconductor device in an encrypted state.
- The cryptographic communication system according to any one of Claims 36 to 45, wherein the correction data generation unit acquires the second unique code a plurality of times, generates second mask data for masking a bit with a high error rate among bits of the acquired second unique code, generates a second error correction code for correcting a bit with a low error rate among bits of the acquired second unique code, and generates a second operation parameter by using the first common key and the second unique code error-corrected using the second mask data and the second error correction code.
- The cryptographic communication system according to Claim 46, wherein a process of generating the correction data is executed in a distributed manner among a plurality of semiconductor devices.
- The cryptographic communication system according to any one of Claims 36 to 47, wherein the first semiconductor device is configured using a secure microcomputer.
- The cryptographic communication system according to any one of Claims 36 to 47, wherein the first and second semiconductor devices are configured using general-purpose microcomputers.
- The cryptographic communication system according to any one of Claims 36 to 49, wherein the first and second semiconductor devices are vehicle-mounted microcomputers.
- The cryptographic communication system according to any one of Claims 36 to 49, wherein
the first semiconductor device is a vehicle-mounted microcomputer forming an in-vehicle network, and
the second semiconductor device is a car navigation system. - A cryptographic communication method using a first semiconductor device and a second semiconductor device, comprising:in the first semiconductor device,generating a first common key by using a first unique code having a value unique to the first semiconductor device and containing a random error and first correction data for correcting the first unique code;generating second correction data for correcting a second unique code by using the generated first common key and a second unique code having a value unique to the second semiconductor device and containing a random error; andin the second semiconductor device,generating the first common key by using the second unique code and the second correction data.
- The cryptographic communication method according to Claim 52, comprising:encrypting the second unique code by using a public key of the first semiconductor device in the second semiconductor device, anddecrypting the encrypted second unique code by using a secret key of the first semiconductor device in the first semiconductor device.
- The cryptographic communication method according to Claim 52 or 53, comprising:generating signature data by using a secret key of the second semiconductor device and a plain text in the second semiconductor device; andgenerating verification data by using a public key of the second semiconductor device transmitted from a server including a database that stores public keys of respective semiconductor devices in association with the respective semiconductor devices and the signature data of the second semiconductor device, and comparing the verification data with the plain text.
- The cryptographic communication method according to Claim 53, comprising:in the second semiconductor device,encrypting a correction data generation program for generating the second correction data using the first common key and the second unique code by using the public key of the first semiconductor device;in the first semiconductor device,decrypting the encrypted correction data generation program; andexecuting the decrypted correction data generation program and generating the second correction data by using the first common key and the second unique code.
- The cryptographic communication method according to any one of Claims 52 to 55, wherein the first semiconductor device and the second semiconductor device communicate using the first common key.
- The cryptographic communication method according to Claim 56, comprising:generating a second common key by using the first unique code unique to the first semiconductor device and third correction data in the first common key generation unit, whereinthe first semiconductor device communicates with the third semiconductor device using the second common key, andthe second semiconductor device communicates with the third semiconductor device through the first semiconductor device.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011136132 | 2011-06-20 | ||
JP2011136131 | 2011-06-20 | ||
JP2012076387A JP2013031151A (en) | 2011-06-20 | 2012-03-29 | Encryption communication system and encryption communication method |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2544400A2 true EP2544400A2 (en) | 2013-01-09 |
EP2544400A3 EP2544400A3 (en) | 2013-07-17 |
EP2544400B1 EP2544400B1 (en) | 2017-12-13 |
Family
ID=46614288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12171635.1A Active EP2544400B1 (en) | 2011-06-20 | 2012-06-12 | PUF based Cryptographic communication system and cryptographic communication method |
Country Status (5)
Country | Link |
---|---|
US (3) | US9363082B2 (en) |
EP (1) | EP2544400B1 (en) |
JP (1) | JP2013031151A (en) |
KR (1) | KR20120140224A (en) |
CN (1) | CN102843231B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338107A (en) * | 2013-06-05 | 2013-10-02 | 北京华大信安科技有限公司 | A secret key generation method and a secret key generation apparatus |
EP3131032A4 (en) * | 2014-04-09 | 2018-05-16 | ICTK Co. Ltd. | Authentication apparatus and method |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9218511B2 (en) * | 2011-06-07 | 2015-12-22 | Verisiti, Inc. | Semiconductor device having features to prevent reverse engineering |
US8975748B1 (en) | 2011-06-07 | 2015-03-10 | Secure Silicon Layer, Inc. | Semiconductor device having features to prevent reverse engineering |
US20150071434A1 (en) * | 2011-06-07 | 2015-03-12 | Static Control Components, Inc. | Secure Semiconductor Device Having Features to Prevent Reverse Engineering |
JP2013031151A (en) * | 2011-06-20 | 2013-02-07 | Renesas Electronics Corp | Encryption communication system and encryption communication method |
CN104025500B (en) | 2011-12-29 | 2017-07-25 | 英特尔公司 | Secure key storage using physically unclonable functions |
US8938792B2 (en) | 2012-12-28 | 2015-01-20 | Intel Corporation | Device authentication using a physically unclonable functions based key generation system |
US10642992B2 (en) * | 2013-01-04 | 2020-05-05 | Pure Storage, Inc. | Password augmented all-or-nothin transform |
US9946474B2 (en) * | 2013-03-27 | 2018-04-17 | Irdeto B.V. | Storing and accessing data |
JP6182371B2 (en) * | 2013-06-28 | 2017-08-16 | ルネサスエレクトロニクス株式会社 | System including semiconductor integrated circuit |
JP2015065495A (en) * | 2013-09-24 | 2015-04-09 | ルネサスエレクトロニクス株式会社 | Encryption key supply method, semiconductor integrated circuit and encryption key management device |
DE102013227184A1 (en) * | 2013-12-27 | 2015-07-02 | Robert Bosch Gmbh | Method for securing a system-on-a-chip |
KR102144528B1 (en) * | 2013-12-30 | 2020-08-14 | 원스팬 인터내셔널 게엠베하 | An authentication apparatus with a bluetooth interface |
US20150249467A1 (en) * | 2014-03-03 | 2015-09-03 | Kabushiki Kaisha Toshiba | Storage device, controller, and data writing method |
WO2015156621A1 (en) * | 2014-04-09 | 2015-10-15 | (주) 아이씨티케이 | Authentication apparatus and method |
EP3131231B1 (en) * | 2014-04-09 | 2019-10-16 | ICTK Holdings Co., Ltd. | Authentication apparatus and method |
US9672342B2 (en) | 2014-05-05 | 2017-06-06 | Analog Devices, Inc. | System and device binding metadata with hardware intrinsic properties |
US9946858B2 (en) | 2014-05-05 | 2018-04-17 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
JP2016046719A (en) | 2014-08-25 | 2016-04-04 | 株式会社東芝 | Data generation device, communication device, mobile body, data generation method, and program |
JP2016134671A (en) * | 2015-01-16 | 2016-07-25 | 株式会社東芝 | Data generation device, communication device, communication system, mobile, data generation method and program |
DE102015201298A1 (en) * | 2015-01-26 | 2016-07-28 | Robert Bosch Gmbh | Method for the cryptographic processing of data |
JP6197000B2 (en) * | 2015-07-03 | 2017-09-13 | Kddi株式会社 | System, vehicle, and software distribution processing method |
WO2017058414A1 (en) | 2015-09-29 | 2017-04-06 | Apple Inc. | Unified addressable memory |
EP3373508B1 (en) * | 2015-11-05 | 2020-11-04 | Mitsubishi Electric Corporation | Security device and security method |
DE102016204055B4 (en) * | 2016-03-11 | 2019-04-04 | Universität Ulm | Method and device for generating a digital signature |
KR101831134B1 (en) | 2016-05-17 | 2018-02-26 | 현대자동차주식회사 | Method of providing security for controller using encryption and appratus for implementing the same |
CN107493253B (en) * | 2016-06-13 | 2020-09-22 | 上海复旦微电子集团股份有限公司 | Wireless radio frequency equipment, server and wireless radio frequency communication system |
US10230700B2 (en) * | 2016-08-09 | 2019-03-12 | Lenovo (Singapore) Pte. Ltd. | Transaction based message security |
KR102563162B1 (en) * | 2016-09-05 | 2023-08-04 | 에스케이하이닉스 주식회사 | Integrated circuit |
CN106650432B (en) * | 2016-09-30 | 2020-11-10 | 北京奇虎科技有限公司 | Method and device for analyzing confidential information |
JP6683588B2 (en) * | 2016-11-10 | 2020-04-22 | Kddi株式会社 | Reuse system, server device, reuse method, and computer program |
US11012230B2 (en) | 2016-12-13 | 2021-05-18 | Renesas Electronics Corporation | Communication apparatus and cryptographic processing system |
US10754970B2 (en) * | 2017-01-27 | 2020-08-25 | International Business Machines Corporation | Data masking |
US10778424B2 (en) * | 2017-02-27 | 2020-09-15 | Cord3 Innovation Inc. | Symmetric cryptographic method and system and applications thereof |
CN107017993B (en) * | 2017-04-01 | 2020-05-05 | 北京江南天安科技有限公司 | Multi-party combined key generation and digital signature method and system |
US10425235B2 (en) | 2017-06-02 | 2019-09-24 | Analog Devices, Inc. | Device and system with global tamper resistance |
US10958452B2 (en) | 2017-06-06 | 2021-03-23 | Analog Devices, Inc. | System and device including reconfigurable physical unclonable functions and threshold cryptography |
JP6754325B2 (en) * | 2017-06-20 | 2020-09-09 | 国立大学法人東海国立大学機構 | Authentication method for in-vehicle authentication system, in-vehicle authentication device, computer program and communication device |
JP7001454B2 (en) | 2017-12-18 | 2022-01-19 | 日本化薬株式会社 | Pharmaceutical product containing fosaprepitant |
CN108199835B (en) * | 2018-01-19 | 2021-11-30 | 北京江南天安科技有限公司 | Multi-party combined private key decryption method |
JP6852009B2 (en) * | 2018-03-20 | 2021-03-31 | 株式会社東芝 | Information processing device and information processing method |
CN109728907A (en) * | 2019-01-31 | 2019-05-07 | 上海易点时空网络有限公司 | Large-scale data circulation method and device |
EP3907633B1 (en) * | 2020-05-05 | 2022-12-14 | Nxp B.V. | System and method for obfuscating opcode commands in a semiconductor device |
CN114312607A (en) * | 2020-06-24 | 2022-04-12 | 华为技术有限公司 | Vehicle control device, whole vehicle integrated unit and vehicle |
US11503114B2 (en) | 2021-01-05 | 2022-11-15 | Toyota Motor North America, Inc. | Provisioning of event-based keys to transports |
US11870557B2 (en) | 2021-01-05 | 2024-01-09 | Toyota Motor North America, Inc. | Process for generating transport keys for data communication based on actions performed by a transport |
US11438158B2 (en) | 2021-01-05 | 2022-09-06 | Toyota Motor North America, Inc. | Provisioning of external functionality to transports |
US11924339B2 (en) | 2021-04-15 | 2024-03-05 | Real Random IP, LLC | System and method for secure end-to-end electronic communication using a privately shared table of entropy |
US12088695B2 (en) * | 2021-12-22 | 2024-09-10 | Intel Corporation | Systems and methods for device authentication in supply chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002026899A (en) | 2000-06-20 | 2002-01-25 | Internatl Business Mach Corp <Ibm> | Verification system for ad hoc wireless communication |
JP2005341528A (en) | 2004-04-28 | 2005-12-08 | Denso Corp | Communication system, key distribution apparatus, encryption processor, and antitheft device |
JP2010527219A (en) | 2007-05-11 | 2010-08-05 | ヴァリディティー センサーズ,インク. | Method and system for electronically securing electronic device security using functions that cannot be physically copied |
JP2010226603A (en) | 2009-03-25 | 2010-10-07 | Sony Corp | Integrated circuit, encryption communication apparatus, encryption communication system, information processing method, and encryption communication method |
JP2011136131A (en) | 2010-01-04 | 2011-07-14 | Nec Corp | Training contents detecting device and weight training apparatus |
JP2011136132A (en) | 2010-01-04 | 2011-07-14 | Toshiba Corp | Medical image diagnostic apparatus and image processor |
JP2012076387A (en) | 2010-10-04 | 2012-04-19 | Seiko Epson Corp | Liquid injection head, liquid injection device, and piezoelectric actuator |
Family Cites Families (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2513170B2 (en) * | 1990-12-10 | 1996-07-03 | 日本電信電話株式会社 | User authentication method |
JP3864401B2 (en) * | 1997-04-23 | 2006-12-27 | ソニー株式会社 | Authentication system, electronic device, authentication method, and recording medium |
US6252961B1 (en) * | 1997-07-17 | 2001-06-26 | Hewlett-Packard Co | Method and apparatus for performing data encryption and error code correction |
US6564322B1 (en) * | 1999-01-26 | 2003-05-13 | International Business Machines Corporation | Method and apparatus for watermarking with no perceptible trace |
CN1243442C (en) * | 2000-12-15 | 2006-02-22 | 英国电讯有限公司 | Transmission and reception of audio and/or video material |
US6611751B2 (en) * | 2001-03-23 | 2003-08-26 | 981455 Alberta Ltd. | Method and apparatus for providing location based data services |
DE10130233A1 (en) * | 2001-06-22 | 2003-01-02 | Bosch Gmbh Robert | Interference masking method for digital audio signal transmission |
US7188994B2 (en) * | 2002-02-22 | 2007-03-13 | Biorep Technologies, Inc. | Orbital shaker for cell extraction |
JP2003273863A (en) * | 2002-03-14 | 2003-09-26 | Fuji Electric Co Ltd | Data reception/distribution system and method |
CA2501647C (en) * | 2002-10-10 | 2013-06-18 | Visualsonics Inc. | High frequency high frame-rate ultrasound imaging system |
JP4346929B2 (en) * | 2003-03-10 | 2009-10-21 | 三菱電機株式会社 | Quantum key distribution method and communication apparatus |
DE10320176B3 (en) * | 2003-05-06 | 2004-12-09 | Infineon Technologies Ag | Frequency channel selection method for frequency hopping radio communications system using evaluation of available channel transmission qualities |
JP4510535B2 (en) * | 2004-06-24 | 2010-07-28 | キヤノン株式会社 | Image processing apparatus, control method therefor, and program |
JP4186928B2 (en) * | 2004-07-21 | 2008-11-26 | セイコーエプソン株式会社 | Security output device, security output system, output device control program and storage medium, and security output method |
EP1842203A4 (en) | 2004-11-12 | 2011-03-23 | Verayo Inc | Volatile device keys and applications thereof |
JP2006155045A (en) * | 2004-11-26 | 2006-06-15 | Sony Corp | Electronic value information transmission system, and electronic value information transmission method |
US8168588B2 (en) * | 2005-01-25 | 2012-05-01 | Five Prime Therapeutics, Inc. | Compositions comprising FGF-9 and betacellulin and methods for treating cardiac conditions |
US7535858B2 (en) * | 2005-06-29 | 2009-05-19 | Intel Corporation | Apparatus and method of block acknowledgements with reduced recipient state information |
DE602006004457D1 (en) * | 2005-07-27 | 2009-02-05 | Ingenia Technology Ltd | SIGNATURE FOR ACCESS TOKENS |
WO2007142170A1 (en) * | 2006-05-29 | 2007-12-13 | Nec Corporation | System for disabling unauthorized person, encryption device, encryption method, and program |
JP2008059304A (en) * | 2006-08-31 | 2008-03-13 | Sony Corp | Communication device, method, and program |
US7945840B2 (en) * | 2007-02-12 | 2011-05-17 | Micron Technology, Inc. | Memory array error correction apparatus, systems, and methods |
ES2883587T3 (en) * | 2007-04-12 | 2021-12-09 | Rambus Inc | Memory system with peer-to-peer request interconnect |
JP2009010623A (en) * | 2007-06-27 | 2009-01-15 | Rohm Co Ltd | Oscillator circuit and method of generating pulse signal |
JP5119869B2 (en) * | 2007-11-08 | 2013-01-16 | 株式会社デンソー | In-vehicle hands-free device |
AU2008344384B2 (en) * | 2007-12-27 | 2012-12-20 | Keiko Ogawa | Information distribution system and program for the same |
JP2010134192A (en) * | 2008-12-04 | 2010-06-17 | Nikon Corp | Tilt stage, and microscope with the same |
JPWO2010134192A1 (en) * | 2009-05-22 | 2012-11-08 | 三菱電機株式会社 | Electronic device, key generation program, recording medium, and key generation method |
EP2326043A1 (en) * | 2009-11-18 | 2011-05-25 | Irdeto Access B.V. | Preventing cloning of receivers of encrypted messages |
US8452482B2 (en) * | 2009-12-10 | 2013-05-28 | GM Global Technology Operations LLC | Self testing systems and methods |
CN101741565A (en) * | 2009-12-18 | 2010-06-16 | 北京握奇数据系统有限公司 | Method and system for transmitting IC (integrated circuit)-card application data |
WO2011086688A1 (en) * | 2010-01-15 | 2011-07-21 | 三菱電機株式会社 | Bit sequence generation device and bit sequence generation method |
US8406134B2 (en) * | 2010-06-25 | 2013-03-26 | At&T Intellectual Property I, L.P. | Scaling content communicated over a network |
FR2964278A1 (en) * | 2010-08-31 | 2012-03-02 | St Microelectronics Rousset | KEY EXTRACTION IN AN INTEGRATED CIRCUIT |
JP5377540B2 (en) * | 2011-02-17 | 2013-12-25 | 株式会社東芝 | Key management system |
US20120278290A1 (en) * | 2011-04-29 | 2012-11-01 | Thomas Anthony Pinch | Database archiving model error detection and correction system |
JP5839659B2 (en) * | 2011-06-20 | 2016-01-06 | ルネサスエレクトロニクス株式会社 | Semiconductor device |
JP2013031151A (en) * | 2011-06-20 | 2013-02-07 | Renesas Electronics Corp | Encryption communication system and encryption communication method |
JP5770026B2 (en) * | 2011-06-20 | 2015-08-26 | ルネサスエレクトロニクス株式会社 | Semiconductor device |
JP5832174B2 (en) * | 2011-07-11 | 2015-12-16 | 株式会社東芝 | Document management system, erasing apparatus, and document management method |
JP6030925B2 (en) * | 2012-11-12 | 2016-11-24 | ルネサスエレクトロニクス株式会社 | Semiconductor device and information processing system |
KR102201642B1 (en) * | 2014-11-28 | 2021-01-13 | 삼성전자주식회사 | Physically unclonable function circuit and key enrolling method thereof |
-
2012
- 2012-03-29 JP JP2012076387A patent/JP2013031151A/en active Pending
- 2012-06-12 EP EP12171635.1A patent/EP2544400B1/en active Active
- 2012-06-13 US US13/495,064 patent/US9363082B2/en active Active
- 2012-06-20 CN CN201210211008.3A patent/CN102843231B/en active Active
- 2012-06-20 KR KR1020120066370A patent/KR20120140224A/en active IP Right Grant
-
2015
- 2015-02-04 US US14/613,661 patent/US9608818B2/en active Active
-
2017
- 2017-02-14 US US15/432,627 patent/US10469256B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002026899A (en) | 2000-06-20 | 2002-01-25 | Internatl Business Mach Corp <Ibm> | Verification system for ad hoc wireless communication |
JP2005341528A (en) | 2004-04-28 | 2005-12-08 | Denso Corp | Communication system, key distribution apparatus, encryption processor, and antitheft device |
JP2010527219A (en) | 2007-05-11 | 2010-08-05 | ヴァリディティー センサーズ,インク. | Method and system for electronically securing electronic device security using functions that cannot be physically copied |
JP2010226603A (en) | 2009-03-25 | 2010-10-07 | Sony Corp | Integrated circuit, encryption communication apparatus, encryption communication system, information processing method, and encryption communication method |
JP2011136131A (en) | 2010-01-04 | 2011-07-14 | Nec Corp | Training contents detecting device and weight training apparatus |
JP2011136132A (en) | 2010-01-04 | 2011-07-14 | Toshiba Corp | Medical image diagnostic apparatus and image processor |
JP2012076387A (en) | 2010-10-04 | 2012-04-19 | Seiko Epson Corp | Liquid injection head, liquid injection device, and piezoelectric actuator |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338107A (en) * | 2013-06-05 | 2013-10-02 | 北京华大信安科技有限公司 | A secret key generation method and a secret key generation apparatus |
CN103338107B (en) * | 2013-06-05 | 2016-12-28 | 北京华大信安科技有限公司 | Key generation method and key generating device |
EP3131032A4 (en) * | 2014-04-09 | 2018-05-16 | ICTK Co. Ltd. | Authentication apparatus and method |
US10958451B2 (en) | 2014-04-09 | 2021-03-23 | Ictk Holdings Co., Ltd. | Authentication apparatus and method |
US11876917B2 (en) | 2014-04-09 | 2024-01-16 | Ictk Holdings Co., Ltd. | Authentication apparatus and method |
Also Published As
Publication number | Publication date |
---|---|
CN102843231B (en) | 2017-03-01 |
EP2544400B1 (en) | 2017-12-13 |
KR20120140224A (en) | 2012-12-28 |
US9363082B2 (en) | 2016-06-07 |
US9608818B2 (en) | 2017-03-28 |
EP2544400A3 (en) | 2013-07-17 |
JP2013031151A (en) | 2013-02-07 |
US20120321077A1 (en) | 2012-12-20 |
US10469256B2 (en) | 2019-11-05 |
US20150156021A1 (en) | 2015-06-04 |
CN102843231A (en) | 2012-12-26 |
US20170155508A1 (en) | 2017-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2544400B1 (en) | PUF based Cryptographic communication system and cryptographic communication method | |
US9300470B2 (en) | Semiconductor device and method of writing data to semiconductor device | |
US10805093B2 (en) | Cryptographic device comprising a physical unclonable function | |
US10708062B2 (en) | In-vehicle information communication system and authentication method | |
EP3444999B1 (en) | Method for generating a public/private key pair and public key certificate for an internet of things device | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
US10375057B2 (en) | Systems and methods for certificate chain validation of secure elements | |
US20130051552A1 (en) | Device and method for obtaining a cryptographic key | |
CN113114475B (en) | PUF identity authentication system and protocol based on bit self-checking | |
Prada-Delgado et al. | Trustworthy firmware update for Internet-of-Thing Devices using physical unclonable functions | |
WO2017194335A2 (en) | Programming device arranged to obtain and store a random bit string in a memory device | |
JP6888122B2 (en) | Semiconductor device, update data provision method, update data reception method and program | |
CN116710914A (en) | Key revocation for edge devices | |
CN115242397A (en) | OTA upgrade security verification method and readable storage medium for vehicle EUC | |
JP6534913B2 (en) | Information processing apparatus and fraudulent message detection method | |
CN107026729B (en) | Method and device for transmitting software | |
CN116232716A (en) | PUF-based OTA upgrading method and storage medium | |
CN111344996B (en) | Secret key generation method, secret key acquisition method, private key updating method, chip and server | |
JP6014214B2 (en) | Cryptographic communication system and cryptographic communication method | |
Gedeon et al. | Secure boot and firmware update on a microcontroller-based embedded board | |
Román Hajderek et al. | A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices | |
CN116032532A (en) | Method, device, equipment and computer storage medium for authorizing air download service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 9/32 20060101ALI20130613BHEP Ipc: H04L 9/08 20060101AFI20130613BHEP |
|
17P | Request for examination filed |
Effective date: 20131105 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: RENESAS ELECTRONICS CORPORATION |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 9/30 20060101ALI20170718BHEP Ipc: H04L 9/32 20060101ALI20170718BHEP Ipc: H04L 9/08 20060101AFI20170718BHEP Ipc: H04L 9/14 20060101ALI20170718BHEP |
|
INTG | Intention to grant announced |
Effective date: 20170817 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: HIROKAWA, MASAYUKI Inventor name: FURUTA, SHIGERU Inventor name: SHIOTA, SHIGEMASA Inventor name: OSHIDA, DAISUKE Inventor name: YAMAZAKI, AKIRA |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 955311 Country of ref document: AT Kind code of ref document: T Effective date: 20171215 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602012040772 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20171213 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180313 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 955311 Country of ref document: AT Kind code of ref document: T Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180314 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180313 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180413 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602012040772 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20180914 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20180612 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180630 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180612 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180630 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180612 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180612 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180630 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180630 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180630 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180612 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20120612 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20171213 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171213 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240627 Year of fee payment: 13 |